hit counter script
Motorola AP-7131N-FGR Product Reference Manual
Hide thumbs Also See for AP-7131N-FGR:
Table of Contents

Advertisement

AP-7131N-FGR Access Point
Product Reference Guide

Advertisement

Table of Contents
loading

Summary of Contents for Motorola AP-7131N-FGR

  • Page 1 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 2 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc. All other product or service names are the property of their respective owners. © 2009 Motorola, Inc. All rights reserved.
  • Page 3 AP-7131N-FGR Access Point Product Reference Guide 72E-126727-01 Revision A September 2009...
  • Page 5: Table Of Contents

    Contents About This Guide Introduction ............vii Document Conventions .
  • Page 6 AP-7131N - FGR Access Point Product Reference Guide Quality of Service (QoS) Support ........1-11 Industry Leading Data Security .
  • Page 7 Mounting an AP-7131N-FGR ........
  • Page 8 AP-7131N - FGR Access Point Product Reference Guide Configuring Your Browser for AP-7131N-FGR Support ....3-4 Accessing the AP-7131N-FGR Using Internet Explorer ....3-5 Accessing the AP-7131N-FGR Using Mozilla Firefox .
  • Page 9 Configuring Network Address Translation (NAT) Settings ....5-23 Configuring Port Forwarding ........5-25 Configuring Dynamic DNS .
  • Page 10 viii AP-7131N - FGR Access Point Product Reference Guide Moving Rogue APs to the Allowed AP List ......6-48 Displaying Rogue AP Details .
  • Page 11 Network LAN, WLAN-Mapping Commands ..... . 8-19 Network LAN, DHCP Commands ....... 8-28 Network Type Filter Commands .
  • Page 12 AP-7131N - FGR Access Point Product Reference Guide Chapter 9. Configuring Mesh Networking Mesh Networking Overview..........9-1 The Client Bridge Association Process .
  • Page 13 Configuration Updates ......... . .10-6 Securing Data Tunnels between the Switch and AAP .
  • Page 14 AP-7131N - FGR Access Point Product Reference Guide BootP Priorities ..........B-9 Configuring an IPSEC Tunnel and VPN FAQs.
  • Page 15: About This Guide

    About This Guide Introduction This guide provides configuration and setup information for the AP-7131N-FGR model access point. Document Conventions The following document conventions are used in this document: NOTE Indicate tips or special requirements. CAUTION Indicates conditions that can cause equipment damage or data...
  • Page 16: Notational Conventions

    If that is necessary, you will be given specific instructions. Motorola is not responsible for any damages incurred during shipment if the approved shipping container is not used. Shipping the units improperly can possibly void the warranty. If the original...
  • Page 17: Chapter 1. Introduction

    Introduction As a standalone access point, an AP-7131N-FGR provides small and medium-sized businesses with a consolidated wired and wireless networking infrastructure, all in a single device. The integrated router, gateway, firewall, DHCP and Power-over-Ethernet (PoE) simplify and reduce the costs associated with networking by eliminating the need to purchase and manage multiple devices.
  • Page 18: New Features

    GUI applet. The AP-7131N-FGR enables you to configure one radio for 802.11a/n support, and the other for 802.11b/g/n support. The two models available to the AP-7131N-FGR series include: •...
  • Page 19: Mu Rate Limiting

    MU within any one of the 16 supported WLANs. Before this 4.0 baseline release, Motorola access points supported bandwidth management on a per- WLAN basis. Each WLAN could be configured to receive (at most) a certain percentage of the total available downstream bandwidth.
  • Page 20: Amsdu Transmission Support

    3af or 3at mode, the transmit power is always lower than the full power setting. With the introduction of the AP-7131N-FGR model access point, the power options available for dual radio model access points has never been more diverse, and careful consideration must be made before deploying the access point.
  • Page 21: Feature Overview

    Introduction solution was more common before 802.11i was introduced, but is not as common now, since 802.11i/ WPA2 is considered more secure. For information on configuring VPN support, see Configuring VPN Tunnels on page 6-23. For instructions on configuring a IPSec VPN tunnel using two access points, see Creating a VPN Tunnel between Two Access Points on page 6-27.
  • Page 22: Support

    QBSS Support 1.2.1 802.11n Support Motorola provides full life-cycle support for either a new or existing 802.11n mobility deployment, from network design to day-to-day support. For information on deploying your 802.11n radio, see Configuring the 802.11a/n or 802.11b/g/n Radio on page 5-59.
  • Page 23 Introduction Sensor support requires a Motorola AirDefense WIPS Server on the network. Sensor functionality is not provided by the access point alone. The access point works in conjunction with a dedicated WIPS server. For information on configuring an AirDefense server for optimal use with an access point in sensor mode, go to http://support.symbol.com/support/product/manuals.do...
  • Page 24: Mesh Roaming Client

    WLAN mode. When a configuration change is made at the AP, the Spectrum Analysis operation stops. • Live View- The WIPS application (commonly referred to as Motorola Enterprise) provides a live view of the sensors, APs and MUs operating in a WLAN. Live view support exists throughout the WIPS application, wherever a device icon appears in an information panel or navigation tree.
  • Page 25: Dual Mode Radio Options

    1.2.4 Dual Mode Radio Options When the access point is manufactured as a dual-radio access point, as is the case with the AP-7131N-FGR, the access point enables you to configure one radio for 802.11a/n support, and the other for 802.11b/g/n support.
  • Page 26: Multiple Mounting Options

    The access point supports several 802.11a/n and 802.11b/g/n radio antennas. Select the antenna best suited to the radio transmission requirements of your coverage area. For an exhaustive overview of the antennas and associated components supported by the Motorola access point family, refer to the Enterprise Wireless LAN Antenna Specification Guide available at http://support.symbol.com/support/product/manuals.do.
  • Page 27: Quality Of Service (Qos) Support

    Setting the WLAN Quality of Service (QoS) Policy on page 5-42. 1.2.11 Industry Leading Data Security The AP-7131N-FGR a unique set of encryption and authentication techniques to protect the data transmitting on the WLAN. The following authentication techniques are supported: •...
  • Page 28: Eap Authentication

    1-12 AP-7131N-FGR Access Point Product Reference Guide The following encryption techniques are supported: • WPA2-CCMP (802.11i) Encryption In addition, the access point supports the following additional security features: • Firewall Security • VPN Tunnels • Content Filtering For an overview on the encryption and authentication schemes available , refer to...
  • Page 29: Firewall Security

    Introduction 1-13 Authentication Code (CBC-MAC) technique. Changing just one bit in a message produces a totally different result. WPA2-CCMP is based on the concept of a Robust Security Network (RSN), which defines a hierarchy of keys with a limited lifetime (similar to TKIP). Like TKIP, the keys the administrator provides are used to derive other keys.
  • Page 30: Vlan Support

    System Settings screen (see Configuring System Settings on page 4-2) is older than the version on the Web site, Motorola recommends updating the access point to the latest firmware version for full feature functionality. For detailed information on updating the firmware using SFTP, see Updating Device Firmware on page 4-53.
  • Page 31: Programmable Snmp V1/V2/V3 Trap Support

    4-28. 1.2.16 Power-over-Ethernet Support When users purchase a Motorola WLAN solution, they often need to place access points in obscure locations. In the past, a dedicated power source was required for each access point in addition to the Ethernet infrastructure. This often required an electrical contractor to install power drops at each access point location.
  • Page 32: Mu-Mu Transmission Disallow

    1-16 AP-7131N-FGR Access Point Product Reference Guide 1.2.17 MU-MU Transmission Disallow The access point’s MU-MU Disallow feature prohibits MUs from communicating with each other even if on the same WLAN, assuming one of the WLAN’s is configured to disallow MU-MU communication.
  • Page 33: Statistical Displays

    This affords the administrator the ability to save the current configuration before making significant changes or restoring a default configuration. A configuration file from a dual radio AP-7131N-FGR can be imported to another dual radio model AP-7131N-FGR. For detailed information on importing or exporting configuration files, see...
  • Page 34: Default Configuration Restoration

    1-18 AP-7131N-FGR Access Point Product Reference Guide 1.2.24 Default Configuration Restoration The access point can restore its default configuration or a partial default configuration (with the exception of current WAN and SNMP settings). Restoring the default configuration is a good way to create new WLANs if the MUs the access point supports have been moved to different radio coverage areas.
  • Page 35: Additional Lan Subnet

    Introduction 1-19 mode) to begin forwarding configuration packets to the base bridge. An access point in base bridge mode allows the access point radio to accept client bridge connections. The two bridges communicate using the Spanning Tree Protocol (STP). The spanning tree determines the path to the root and detects if the current connection is part of a network loop with another connection.
  • Page 36: On-Board Radius Server Authentication

    1-20 AP-7131N-FGR Access Point Product Reference Guide For detailed information on configuring the access point for additional LAN subnet support, see Configuring the LAN Interface on page 5-1. 1.2.28 On-board Radius Server Authentication The access point can function as a Radius Server to provide user database information and user authentication.
  • Page 37: Routing Information Protocol (Rip)

    An adaptive AP (AAP) is an access point that can adopt like an AP300 (L3). The management of an AAP is conducted by a switch, once the access point connects to a Motorola WS5100, RFS6000 or RFS7000 model switch and receives its AAP configuration.
  • Page 38: Rogue Ap Enhancements

    1-22 AP-7131N-FGR Access Point Product Reference Guide • local 802.11 traffic termination • local encryption/decryption • local traffic bridging • the tunneling of centralized traffic to the wireless switch For a information overview of the adaptive AP feature as well as how to configure it, refer to Adaptive AP on page 10-1.
  • Page 39: Theory Of Operations

    2.4 to 2.5-GHz frequency range (802.11b/g/n radio) or the 5 GHz frequency range (802.11a/n radio), the actual range is country-dependent. Motorola devices, like other Ethernet devices, have unique, hardware encoded Media Access Control (MAC) or IEEE addresses.
  • Page 40: Wireless Coverage

    1-24 AP-7131N-FGR Access Point Product Reference Guide 1.3.1 Wireless Coverage An access point establishes an average communication range with MUs called a Basic Service Set (BSS) or cell. When in a particular cell, the MU associates and communicates with the access point supporting the radio coverage area of that cell.
  • Page 41: Media Types

    Introduction 1-25 an ARP (Address Resolution Protocol) request packet, the access point forwards it over all enabled interfaces except over the interface the ARP request packet was received. On receiving the ARP response packet, the access point database keeps a record of the destination address along with the receiving interface.
  • Page 42: Mu Association Process

    1-26 AP-7131N-FGR Access Point Product Reference Guide sequence enables the receiving MU to recreate the original data pattern, even if bits in the chipping sequence are corrupted by interference. The ratio of chips per bit is called the spreading ratio. A high spreading ratio increases the resistance of the signal to interference.
  • Page 43: Operating Modes

    WLANs. Each WLAN can be configured to be broadcast by one or both access point radios. An AP-7131N-FGR can operate in both an access point mode and Wireless Gateway/Router mode simultaneously. The network architecture and access point configuration define how the Access Point and Wireless Gateway/Router mode are negotiated.
  • Page 44: Mac Address Assignment

    1-28 AP-7131N-FGR Access Point Product Reference Guide • Secure Java-Based WEB UI - (use Sun Microsystems’ JRE 1.5 or higher available from Sun’s Web site and be sure to disable Microsoft’s Java Virtual Machine if installed) • Command Line Interface (CLI) via Serial, Telnet and SSH •...
  • Page 45: Chapter 2. Hardware Installation

    Hardware Installation An AP-7131N-FGR access point installation includes mounting the access point, connecting the access point to the network, connecting antennae and applying power. Installation procedures vary for different environments. See the following sections for more details: • Precautions •...
  • Page 46: Precautions

    2.1 Precautions Before installing an AP-7131N-FGR model access point, verify the following: • Do not install in wet or dusty areas without additional protection. Contact a Motorola representative for more information. • Verify the environment has a continuous temperature range between -20° C to 50° C.
  • Page 47: Access Point Placement

    The facade connects to the access point as illustrated. Once attached, the LEDs continue to illuminate through the facade. Contact your Motorola sales associate for information on ordering a facade with your access point. 2.4 Access Point Placement For optimal performance, install the access point away from transformers, heavy-duty motors, fluorescent lights, microwave ovens, refrigerators and other industrial equipment.
  • Page 48: Site Surveys

    Motorola recommends conducting a new site survey and developing a new coverage area floor plan when switching from legacy access points to a new AP-7131N-FGR model, as the device placement requirements could be significantly different.
  • Page 49 Omni-Directional Antenna ML-2499-BYGA2-01R Yagi Antenna 13.9 ML-2452-APA2-01 Dual-Band ML-2452-PTA2M3X3-1 Facade with 6 Element Antenna Module ML-2452-PTA3M3-036 3 Port MIMO Antenna 4.75/5.5 NOTE An additional adapter is required to use ML-2499-11PNA2-01 and ML-2499-BYGA2-01 model antennae. Please contact Motorola for more information.
  • Page 50: Power Options

    2: -3.38dBi band 3: -2.84dBi band 4: -2.94dBi For a more exhaustive overview of the antennas and associated components supported by the Motorola access point family, refer to the Enterprise Wireless LAN Antenna Specification Guide available at http://support.symbol.com/support/product/manuals.do. 2.5 Power Options The power options for an AP-7131N-FGR include: •...
  • Page 51: Power Injector System

    Hardware Installation 2.6 Power Injector System An AP-7131N-FGR can receive power via an Ethernet cable connected to the GE1/POE (LAN) port. When users purchase a WLAN solution, they often need to place access points in obscure locations. In the past, a dedicated power source was required for each access point in addition to the Ethernet infrastructure.
  • Page 52: Installing The Power Injector

    CAUTION The access point supports any standards-based compliant power source (including non-Motorola power sources). However, using the wrong solution (including a POE system used on a legacy Motorola access point) could either limit functionality or severely damage the access point and void the product warranty.
  • Page 53: Cabling The Power Injector

    Hardware Installation • The Power Injector is not a repeater, and does not amplify the Ethernet data signal. For optimal performance, ensure the unit is placed as close as possible to the network data port. CAUTION To avoid problematic performance and restarts, disable POE from a wired switch port connected to an access point if mid-span power sourcing equipment (PSE) is used between the two, regardless of the manufacturer of the switch.
  • Page 54: Mounting An Ap-7131N-Fgr

    AP-7131N-FGR Access Point Product Reference Guide 2.7 Mounting an AP-7131N-FGR An AP-7131N-FGR can attach to a wall, mount under a suspended T-Bar or above a ceiling (plenum or attic) following the same installation instructions. Choose one of the following mounting options based on the physical environment of the coverage area.
  • Page 55 Hardware Installation 2-11...
  • Page 56 2-12 AP-7131N-FGR Access Point Product Reference Guide 1. Xerox copy the template (on the previous page) to a blank piece of paper. Do not reduce or enlarge the scale of the template. CAUTION If printing the mounting template (on the previous page) from an electronic PDF, dimensionally confirm the template by measuring each value for accuracy.
  • Page 57: Suspended Ceiling T-Bar Installations

    Hardware Installation 2-13 10. Cable the access point using either the Power Injector solution or an approved line cord and power supply. For Power Injector installations: a. Connect a RJ-45 CAT5e (or CAT6) Ethernet cable between the network data supply (host) and the Power Injector Data In connector.
  • Page 58 To install the access point on a ceiling T-bar: 1. Motorola recommends you loop a safety wire—with a diameter of at least 1.01 mm (.04 in.), but no more than 0.158 mm (.0625 in.) —through the tie post (above the console connector) and secure the loop.
  • Page 59: Above The Ceiling (Plenum) Installations

    Hardware Installation 2-15 9. Push the back of the access point chassis on to the bottom of the ceiling T-bar. CAUTION Ensure the safety wire and cabling used in the T-Bar installation is securely fastened to the building structure in order to provide a safe operating environment.
  • Page 60 2-16 AP-7131N-FGR Access Point Product Reference Guide NOTE The AP-7131N-FGR is Plenum rated to UL2043 and NEC1999 to support above the ceiling installations. CAUTION Motorola does not recommend mounting the access point directly to any suspended ceiling tile with a thickness less than 12.7mm (0.5in.) or a suspended ceiling tile with an unsupported span greater than 660mm (26in.).
  • Page 61 Antenna Options on page 2-4. 12. Motorola recommends attaching safety wire to the access point’s safety wire tie point or security cable (if used) to the access point’s lock port. 13. Align the ceiling tile into its former ceiling space.
  • Page 62: Led Indicators

    4-1. 2.8 LED Indicators An AP-7131N-FGR model access point has six LEDs on the top of the access point housing, and one optional LED light pipe at the bottom of the unit. However, an AP-7131N-FGR model access point does not use LED 6, as no third radio is available. Five LEDs illuminate (on top of the housing) for dual radios models.
  • Page 63 Hardware Installation 2-19 NOTE Depending on how the 5 GHz and 2.4 GHz radios are configured, the LEDs will blink at different intervals between amber and yellow (5 GHz radio) and emerald and yellow (2.4 GHz radio). The LEDs on the top housing of the access point are clearly visible in wall and below ceiling installations.
  • Page 64: Dual Radio (2.4/5 Ghz) Leds

    2-20 AP-7131N-FGR Access Point Product Reference Guide 2.8.1 Dual Radio (2.4/5 GHz) LEDs A dual radio (2.4/5 Ghz) model access point has the following unique LED behavior: LED 1 LED 2 (LAN) LED 3 (WAN) LED 4 - 5 GHz LED 5 - 2.4 GHz...
  • Page 65: Rear Led

    3-20. Refer to the LA-5030 & LA-5033 Wireless Networker PC Card and PCI Adapter Users Guide, available from the Motorola Web site, for installing drivers and client software if operating in an 802.11a/g network environment. Refer to the Spectrum24 LA-4121 PC Card, LA-4123 PCI Adapter & LA-4137 Wireless Networker User Guide, available from the Motorola Web site, for installing drivers and client software if operating in an 802.11b network environment.
  • Page 66: Mus

    When this occurs, Motorola recommends changing the Windows XP settings so the adapter can use settings defined for legacy (802.11a/bg) adapter operation. Once network conditions improve, use Windows XP to re-enable the adapter for 802.11n support.
  • Page 67 Hardware Installation 2-23 NOTE If re-enabling the adapter for 802.11 support, ensure additional 802.11n settings (Aggregation, Channel Width, Guard Interval etc.) are also enabled to ensure optimal operation. 7. Click to save the updates to the adapter’s configuration.
  • Page 68 2-24 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 69: Chapter 3. Getting Started

    Getting Started The access point should be installed in an area tested for radio coverage using one of the site survey tools available to the field service technician. Once an installation site has been identified, the installer should carefully follow the hardware precautions, requirements, mounting guidelines and power options outlined in Hardware Installation.
  • Page 70: Configuration Options

    Ceiling (Plenum) Installations on page 2-15. For information on the antenna suite available to the AP-7131N-FGR, see Antenna Options on page 2- 4. For more information on using a Power Injector to combine Ethernet and power in one cable to an...
  • Page 71: Initially Connecting To The Access Point

    3.3 Initially Connecting to the Access Point NOTE The procedures described below assume this is the first time you are connecting to an AP-7131N-FGR model access point. NOTE The computer being used should be configured to use the same IP address and subnet mask as the access point.
  • Page 72: Basic Configuration

    An AP-7131N-FGR model access point is compliant with the FIPS140-2 standard. The AP-7131N-FGR is only accessible using browsers that support the TLS 1.0 protocol. The AP-7131N-FGR is not accessible by browsers supporting the SSL 2.0 or SSL 3.0 protocols. Additionally, ensure JRE (version 1.6 or above) is installed on the computer accessing the AP-7131N-FGR GUI applet.
  • Page 73: Accessing The Ap-7131N-Fgr Using Internet Explorer

    Remember, the AP-7131N-FGR does not support SSL 2.0 or SSL 3.0. 4. Enter the IP address of the AP-7131N-FGR. Remember to use https (and not http) when you enter the IP address, as http is not supported with the AP-7131N-FGR.
  • Page 74: Configuring The Access Point

    1024 x 768 pixels or greater. Remember, Internet Explorer and Mozilla Firefox require unique settings be defined in order for the browser to access the AP-7131N-FGR GUI applet. For instructions on configuring these browser settings, see Configuring Your Browser for AP-7131N-FGR Support on page 3-4.
  • Page 75 Change Admin Password window displays. Change the password to ensure the AP-7131N-FGR is using a secure password different from the default password. The new password must be at least 8 characters in length. Enter the current password and a new admin password in fields provided. Click Apply. Once the admin password has been updated, a warning message displays stating the access point must be set to a country.
  • Page 76: Configuring Device Settings

    AP-7131N-FGR Access Point Product Reference Guide 3.4.3 Configuring Device Settings Configure a set of minimum required device settings within the Quick Setup screen. The values (LAN, WAN etc.) can often be defined in other locations within the menu tree. When you change the settings in the Quick Setup screen, the values also change within the screen where these parameters also exist.
  • Page 77 Country Select the Country for the AP-7131N-FGR’s country of operation. The access point prompts for the correct country code on the first login. A warning message also displays stating an incorrect country setting may result in illegal radio operation. Selecting the correct country is central to legally operating the access point.
  • Page 78 Define a primary and alternate WIPS server IP Address for WIPS Server 1 and 2. These are the addresses of the primary and secondary WIPS console server. WIPS support requires a Motorola AirDefense WIPS Server on the network. WIPS functionality is not provided by the access point alone. The access point works in conjunction with the dedicated WIPS server(s).
  • Page 79 Getting Started 3-11 5.0 GHz WLAN - no Sensor Radio1 Disabled, Radio 2 WLAN Radios Off Radios 1 and 2 Disabled 5. Select the Quick Setup screen’s Network Configuration tab to define a minimum set of WAN or LAN configuration values. The WAN tab displays by default. Set a minimum set of parameters for using the WAN interface.
  • Page 80 DHCP server to a host. Some of these parameters are IP address, network mask, and gateway. NOTE Motorola recommends that the WAN and LAN ports should not be configured as DHCP clients at the same time.
  • Page 81 DHCP server over the LAN connection. Select the Bootp client option to enable a diskless system to discover its own IP address. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients. c. Enter the network-assigned IP Address of the access point.
  • Page 82 Quick Setup screen. Policies can be defined over time and saved to be used as needed as security requirements change. Motorola recommends you familiarize yourself with the security options available on the access point before defining a security policy. Refer to...
  • Page 83: Configuring Basic Wlan Security Settings

    Multiple WLANs can share the same security policy, so be careful not to name security policies after specific WLANs or risk defining a WLAN to single policy. Motorola recommends naming the policy after the attributes of the authentication or encryption type selected.
  • Page 84 3-16 AP-7131N-FGR Access Point Product Reference Guide 4. Configure the Key Rotation Settings as required to set Broadcast Key Rotation and the update interval. Broadcast Key Select the Broadcast Key Rotation checkbox to enable or disable Rotation broadcast key rotation. When enabled, the key indices used for...
  • Page 85: Defining An Ipsec Vpn Tunnel

    At this point, you can test the access point for MU interoperability. 3.4.3.2 Defining an IPSec VPN Tunnel A secure IPSec VPN tunnel must be established between the AP-7131N-FGR and the external server providing the access point’s external NTP, syslog or Radius resources. Ensure the IP address of the external NTP, syslog or Raidus resource is known, as it must be supplied to the access point for the access point to properly access and communicate with the external resource.
  • Page 86 3-18 AP-7131N-FGR Access Point Product Reference Guide 2. Select the button from within the VPN Tunnels field to define the attributes of a new tunnel to provide secure access to the access point’s external NTP, syslog or Radius resources. 3. Refer to the...
  • Page 87 Getting Started 3-19 Remote Subnet Mask Enter the subnet mask for the tunnel’s remote network for the tunnel. The remote subnet mask is the subnet setting for the remote network the tunnel connects to. Remote Gateway Enter a numerical (non-DNS) remote gateway IP address for the tunnel.
  • Page 88: Testing Connectivity

    (WNMP) ping packets to the associated MU. Use the Echo Test screen to specify a target MU and configure the parameters of the test. The WNMP ping test only works with Motorola MUs. Only use a Motorola MU to test access point connectivity using WNMP.
  • Page 89: Where To Go From Here

    Getting Started 3-21 3.4.5 Where to Go from Here? Once basic connectivity has been verified, the access point can be fully configured to meet the needs of the network and the users it supports. Refer to the following: • For detailed information on access point device access, SNMP settings, network time, importing/exporting device configurations and device firmware updates, see Chapter 4, System Configuration on page 4-1.
  • Page 90 3-22 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 91: Chapter 4. System Configuration

    WAN port, the default static IP address is 10.1.1.1. The default password is “ .” If connected motorola to the access point using the LAN port, the default setting is DHCP client. The user is required to know the IP address to connect to the access point using a Web browser.
  • Page 92: Configuring System Settings

    AP-7131N-FGR Access Point Product Reference Guide System configuration topics include: • Configuring System Settings • Configuring Power Settings • Adaptive AP Setup • Configuring Data Access • Managing Certificate Authority (CA) Certificates • Configuring SNMP Settings • Configuring Network Time Protocol (NTP) •...
  • Page 93 System Name Specify a device name for the access point. Motorola recommends selecting a name serving as a reminder of the user base the access point supports (engineering, retail, etc.). This name will appear in the WIPS server when one of the radios is configured as a sensor and the WIPS functionality connects to the WIPS server.
  • Page 94 Version The dIsplayed number is the current version of the device firmware. Use this information to determine if the access point is running the most recent firmware available from Motorola. Use the Firmware Update screen to keep the AP’s firmware up to date. For more...
  • Page 95 AP (if necessary). Reset Keys to Zero The AP-7131N-FGR access points has a mechanisms that resets keys to zero values. This is necessary when the access point require maintenance and must be placed in a non-secure environment.
  • Page 96: Configuring Power Settings

    AP-7131N-FGR Access Point Product Reference Guide CAUTION After a reboot, static route entries disappear from the AP Route Table if a LAN Interface is set to DHCP Client. The entries can be retrieved (once the reboot is done) by performing an Apply operation from the WEB UI or a save operation from the CLI.
  • Page 97 (3af, 3at or Full Power for an AP-7131N-FGR model). NOTE An AP-7131N-FGR model uses 22 watts when its power status is 3af, 23 - 26 watts when its power status is 3at and 27 watts when its power status is Full Power.
  • Page 98 AP-7131N-FGR Access Point Product Reference Guide Maximum Maximum Transmit Power Transmit Power Rates (Mbps) MCS Indices Bandwidth 2.4 GHz 5 GHz 20MHz 20MHz 20MHz 20MHz MCS0/MCS8 HT20/40 MCS1/MCS9 HT20/40 MCS2/MCS10 HT20/40 MCS3/MCS11 HT20/40 MCS4/MCS12 HT20/40 MCS5/MCS13 HT20/40 MCS6/MCS14 HT20/40 MCS7/MCS15...
  • Page 99 System Configuration Maximum Maximum Transmit Power Transmit Power Rates (Mbps) MCS Indices Bandwidth 2.4 GHz 5 GH 20MHz 20MHz 20MHz 20MHz 20MHz 20MHz 20MHz 20MHz 20MHz 20MHz MCS0/MCS8 HT20/40 MCS1/MCS9 HT20/40 MCS2/MCS10 HT20/40 MCS3/MCS11 HT20/40 MCS4/MCS12 HT20/40 MCS5/MCS13 HT20/40 MCS6/MCS14 HT20/40 MCS7/MCS15 HT20/40...
  • Page 100 SKU. For 3af and 3at, choose between Default Option as best suited to that AP-7131N-FGR hardware SKU. For example, if Option is selected for 3af Power, and the access point is a dual radio model, the following configuration is set:...
  • Page 101: Adaptive Ap Setup

    4-11 Power Status Refer to the (read only) power status field to review the power available to the AP. For an AP-7131N-FGR model, the options are 3at, 3af or Full Power. Power Mode When the access point is powered on for the first time, the system determines the power budget available to the access point.
  • Page 102 Adaptive AP on page 10-1. NOTE AAP functionality is only supported on a Motorola WS5100 model switch (running firmware version 3.1) or higher and a Motorola RFS7000 model switch (running firmware version 1.1 or higher). NOTE The Adaptive AP Setup screen does not display the AAP’s adoption status or adopted switch.
  • Page 103 System Configuration 4-13 2. Define the following to prioritize a switch connection scheme and AP interface used to adopt to the switch. Control Port Define the port used by the switch FQDN to transmit and receive with the AAP. The default control port is 24576. Switch FQDN Add a complete switch fully qualified domain name (FQDN) to add a switch to the 12 available switch IP addresses available for...
  • Page 104 4-14 AP-7131N-FGR Access Point Product Reference Guide Auto Discovery Enable When the Auto Discovery Enable checkbox is selected, the access point begins the switch discovery (adoption) process using DHCP first, then a user provided domain name, lastly using static IP addresses.
  • Page 105: Configuring Data Access

    To avoid jeopardizing the network data managed by the access point, Motorola recommends enabling only those interfaces used in the routine (daily) management of the network, and disabling all other interfaces until they are required.
  • Page 106 4-16 AP-7131N-FGR Access Point Product Reference Guide 2. Use the access point Access field checkboxes to enable/disable the following on the access point’s LAN1, LAN2 or WAN interfaces: Applet HTTPS (port Select the LAN1, LAN2 and/or WAN checkboxes to enable access...
  • Page 107 System Configuration 4-17 HTTP/S Timeout Disables access to the access point if no data activity is detected over Applet HTTPS (port 443) after the user defined interval. Default is 0 Mins. 4. Configure the Secure Shell field to set timeout values to reduce network inactivity. Authentication Defines the maximum time (between 30 - 120 seconds) allowed for Timeout...
  • Page 108 Radius-enabled device configured with the same shared secret. Apply the qualifications of a well-chosen password to the generation of a shared secret. Generate a random, case-sensitive string using letters and numbers. The default is motorola. 7. Update the Administrator Access field to change the administrative password used to access the configuration settings.
  • Page 109: Managing Certificate Authority (Ca) Certificates

    System Configuration 4-19 9. Click Apply to save any changes to the access point Access screen. Navigating away from the screen without clicking the Apply button results in all changes to the screen being lost. 10. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on the access point Access screen to the last saved configuration.
  • Page 110 4-20 AP-7131N-FGR Access Point Product Reference Guide certificate. A browser must contain this CA certificate in its Trusted Root Library so it can trust certificates “signed” by the CA's private key. Depending on the public key infrastructure, the digital certificate includes the owner's public key, the certificate expiration date, the owner's name and other public key owner information.
  • Page 111: Creating Self Certificates For Accessing The Vpn

    System Configuration 4-21 2. Copy the content of the CA Certificate message (using a text editor such as notepad) and click on Paste from Clipboard. The content of the certificate displays in the Import a root CA Certificate field. 3. Click the Import root CA Certificate button to import it into the CA Certificate list.
  • Page 112 4-22 AP-7131N-FGR Access Point Product Reference Guide CAUTION Self certificates can only be generated using the access point GUI and CLI interfaces. No functionality exists for creating a self-certificate using the access point’s SNMP configuration option. To create a self certificate: 1.
  • Page 113 System Configuration 4-23 Key ID Enter a logical name for the certificate to help distinguish between certificates. The name can be up to 7 characters in length. Subject The required Subject value contains important information about the certificate. Contact the CA signing the certificate to determine the content of the Subject parameter.
  • Page 114 4-24 AP-7131N-FGR Access Point Product Reference Guide The generated certificate request displays in Self Certificates screen text box. 6. Click the Copy to Clipboard button. The content of certificate request is copied to the clipboard. Create an email to your CA, paste the content of the request into the body of the message and send it to the CA.
  • Page 115: Creating A Certificate For Onboard Radius Authentication

    System Configuration 4-25 NOTE If the access point is restarted after a certificate request has been generated but before the signed certificate is imported, the import will not execute properly. Do not restart the access point during this process. 8. To use the certificate for a VPN tunnel, first define a tunnel and select the IKE settings to use DES certificates.
  • Page 116 RSA encryption. • SHA1-RSA - Secure Hash Algorithm 1 in combination with RSA encryption. Key Length Defines the length of the key. Possible values are 512, 1024, and 2048. Motorola recommends setting this value to 1024 to ensure optimum functionality.
  • Page 117 System Configuration 4-27 4. Complete as many of the optional values within the Certificate Request screen as possible. 5. When the form is completed, click the Generate button from within the Certificate Request screen. The Certificate Request screen disappears and the ID of the generated certificate request displays in the drop-down list of certificates within the Self Certificates screen.
  • Page 118: Configuring Snmp Settings

    NOTE The Symbol-AP_MIB contains the majority of the information contained within the Symbol-CC-WS2000-MIB-2.0 file. This feature rich information has been validated with the Motorola WS2000 and proven reliable for use with an AP-7131N-FGR model access point. The remaining portion of the Symbol-AP_MIB contains supplemental information unique to the access point feature set.
  • Page 119 System Configuration 4-29 Use the table below to locate the MIB where the given feature can be configured. Feature Feature LAN Configuration Symbol-AP_MIB Subnet Configuration Symbol-CC-WS2000-MIB-2.0 VLAN Configuration Symbol-AP_MIB DHCP Server Symbol-CC-WS2000-MIB-2.0 Configuration 802.1x Port Symbol-AP_MIB Advanced DHCP Symbol-CC-WS2000-MIB-2.0 Authentication Server configuration Ethernet Type Filter Symbol-AP_MIB...
  • Page 120 4-30 AP-7131N-FGR Access Point Product Reference Guide SNMP Trap Symbol-CC-WS2000-MIB-2.0 Configuration NTP Server Symbol-CC-WS2000-MIB-2.0 Configuration Logging Configuration Symbol-CC-WS2000-MIB-2.0 Firmware Update Symbol-CC-WS2000-MIB-2.0 Wireless Stats Symbol-CC-WS2000-MIB-2.0 Radio Stats Symbol-CC-WS2000-MIB-2.0 MU Stats Symbol-CC-WS2000-MIB-2.0 Automatic Update Symbol-CC-WS2000-MIB-2.0 SNMP allows a network administrator to manage network performance, find and solve network problems, and plan for network growth.
  • Page 121 A read-only community string allows a remote device to retrieve information, while a read/ write community string allows a remote device to modify settings. Motorola recommends considering adding a community definition using a site-appropriate name and access level. Set up a read/write definition (at a minimum) to facilitate full access by the access point administrator.
  • Page 122 4-32 AP-7131N-FGR Access Point Product Reference Guide Click to create a new SNMP v1/v2c community definition. Delete Select Delete to remove a SNMP v1/v2c community definition. Community Use the Community field to specify a site-appropriate name for the community. The name is required to match the name used within the remote network management software.
  • Page 123 System Configuration 4-33 Use the (Object Identifier) area to specify a setting of All or enter a Custom OID. Select to assign the user access to all OIDs in the MIB. The OID field uses numbers expressed in dot notation. Passwords Select Passwords...
  • Page 124 4-34 AP-7131N-FGR Access Point Product Reference Guide 6. Click Apply to save any changes to the SNMP Access screen. Navigating away from the screen without clicking the Apply button results in all changes to the screen being lost. 7. Click Undo Changes (if necessary) to undo any changes made.
  • Page 125: Configuring Snmp Access Control

    System Configuration 4-35 4.6.1 Configuring SNMP Access Control Use the SNMP Access Control screen (as launched from the SNMP Access screen) to specify which users can read SNMP generated information and, if capable, modify related settings from an SNMP-capable client. Use the SNMP Access Control screen's Access Control List (ACL) to limit, by Internet Protocol (IP) address, who can access the access point SNMP interface.
  • Page 126: Enabling Snmp Traps

    4-36 AP-7131N-FGR Access Point Product Reference Guide Access Control List Enter Start IP and End IP addresses (numerical addresses only, no DNS names supported) to specify a range of user that can access the access point SNMP interface. An SNMP-capable client can be set up whereby only the administrator (for example) can use a read/ write community definition.
  • Page 127 System Configuration 4-37 1. Select System Configuration - > SNMP Access - > SNMP Trap Configuration from the access point menu tree. CAUTION Ensure IPSec has been properly configured to protect communications with the external SNMP server. Changes will not be applied otherwise.
  • Page 128 4-38 AP-7131N-FGR Access Point Product Reference Guide Click to create a new SNMP v1/v2c Trap Configuration entry. Port Specify a destination User Datagram Protocol (UDP) port for receiving traps. The default is 162. Community Enter a community name specific to the SNMP-capable client that receives the traps.
  • Page 129: Configuring Specific Snmp Traps

    Use the SNMP Traps screen to enable specific traps on the access point. Motorola recommends defining traps to capture unauthorized devices operating within the access point coverage area. Trap configuration depends on the network machine that receives the generated traps. SNMP v1/v2c and v3 trap configurations function independently.
  • Page 130 4-40 AP-7131N-FGR Access Point Product Reference Guide 2. Configure the MU Traps field to generate traps for MU associations, MU association denials and MU authentication denials. When a trap is enabled, a trap is sent every 10 seconds until the condition no longer exists.
  • Page 131 System Configuration 4-41 3. Configure the SNMP Traps field to generate traps when SNMP capable MUs are denied authentication privileges or are subject of an ACL violation. When a trap is enabled, a trap is sent every 5 seconds until the condition no longer exists. SNMP authentication Generates a trap when an SNMP-capable client is denied access failures...
  • Page 132: Configuring Snmp Rf Trap Thresholds

    4-42 AP-7131N-FGR Access Point Product Reference Guide System Cold Start Generates a trap when the access point re-initializes while transmitting, possibly altering the SNMP agent's configuration or protocol entity implementation. Rogue AP Detection Generates a trap if a Rogue AP is detected by the access point.
  • Page 133 System Configuration 4-43 2. Configure the RF Trap Thresholds field to define device threshold values for SNMP traps. NOTE Average Bit Speed,% of Non-Unicast, Average Signal, Average Retries,% Dropped and % Undecryptable are not access point statistics. Pkts/s Enter a maximum threshold for the total throughput in Pps (Packets per second).
  • Page 134: Configuring Network Time Protocol (Ntp)

    Enter the minimum number of packets that must pass through the packets required for a device before an SNMP rate trap is sent. Motorola recommends trap to fire using the default setting of 1000 as a minimum setting for the field.
  • Page 135 System Configuration 4-45 Time synchronization is recommended for the access point’s network operations. Use the Date and Time Settings screen to enable NTP and specify the IP addresses and ports of available NTP servers. NOTE The current time is not set accurately when initially connecting to the access point.
  • Page 136 4-46 AP-7131N-FGR Access Point Product Reference Guide 2. From within the Current Time field, click the Refresh button to update the time since the screen was displayed by the user. The Current Time field displays the current time based on the access point system clock. If NTP is disabled or if there are no servers available, the system time displays the access point uptime starting at 1970-01-01 00:00:00, with the time and date advancing.
  • Page 137 System Configuration 4-47 CAUTION If using the Radius time-based authentication feature to authenticate access point user permissions, ensure has been selected from Time Zone field. If UTC is not selected, time based authentication will not work properly. For information on configuring Radius time-based authentication, see Defining User Access Permissions by Group on page...
  • Page 138: Logging Configuration

    4-48 AP-7131N-FGR Access Point Product Reference Guide 4.8 Logging Configuration The access point provides the capability for periodically logging system events that prove useful in assessing the throughput and performance of the access point or troubleshooting problems on the access point managed Local Area Network (LAN). Use the...
  • Page 139 System Configuration 4-49 View Log Click View to save a log of events retained on the access point. The system displays a prompt requesting the administrator password before saving the log. After the password has been entered, click Get File to display a dialogue with buttons to Open Save...
  • Page 140: Importing/Exporting Configurations

    Admin Password only if the access point is set to factory default. If the access point is not configured to factory default settings, the Admin User password WILL NOT get imported. A configuration file from a dual radio AP-7131N-FGR can be imported to another dual radio model AP-7131N-FGR.
  • Page 141 CAUTION Motorola discourages importing a 1.0 baseline configuration file to a 1.1 version access point. Similarly, a 1.1 baseline configuration file should not be imported to a 1.0 version access point. Importing configuration files between different versions results in broken configurations, since new features added to the 1.1 version access...
  • Page 142 Click to cancel the configuration file export. NOTE Motorola recommends importing configuration files using the CLI. If errors occur during the import process, they display all at once and are easier to troubleshoot. The access point GUI displays errors one at a time, and...
  • Page 143: Updating Device Firmware

    4.10 Updating Device Firmware Motorola periodically releases updated versions of the access point device firmware to the Motorola Web site. If the access point firmware version displayed on the System Settings...
  • Page 144 AP-7131N-FGR Access Point Product Reference Guide Upgrading to a new access point firmware baseline does not retain the configuration of the previous (lower version) firmware. Motorola recommends users export their 1.0 configuration for backup purposes prior to upgrading. CAUTION An AP-7131N-FGR model access point only supports version 4.x firmware and above.
  • Page 145 System Configuration 4-55 CAUTION Make sure a copy of the access point’s configuration is exported before updating the firmware. To conduct a firmware update on the access point: 1. Export the access point current configuration settings before updating the firmware to have the most recent settings available after the firmware is updated.
  • Page 146 4-56 AP-7131N-FGR Access Point Product Reference Guide CAUTION If using a Linux server configured to support the BootP “bf” option, an automatic firmware update is not be triggered unless both the Enable Automatic Firmware Update Enable Automatic Configuration Update options are selected. If the Configuration Update option is disabled, the access point will not download the configuration file.
  • Page 147 System Configuration 4-57 11. Click Logout to securely exit the access point Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 148 4-58 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 149: Chapter 5. Network Management

    The AP-7131N-FGR has one physical LAN port supporting two unique LAN interfaces. The AP-7131N-FGR LAN port has its own MAC address. The LAN port MAC address is always the value of the access point WAN port MAC address plus 1. The LAN and WAN port MAC addresses...
  • Page 150 AP-7131N-FGR Access Point Product Reference Guide For information on locating the access point’s MAC addresses, see Viewing WAN Statistics on page Viewing LAN Statistics on page 7-6. Use the LAN Configuration screen to enable one (or both) of the access point’s LAN interfaces, assign them names, define which LAN is currently active on the access point Ethernet port and assign a timeout value to disable the LAN connection if no data traffic is detected within a defined interval.
  • Page 151 Network Management Enable Select the LAN1 and/or LAN2 checkbox to allow the forwarding of data traffic over the specified LAN connection. The LAN1 connection is enabled by default, but both LAN interfaces can be enabled simultaneously. The LAN2 setting is disabled by default. LAN Name Use the LAN Name...
  • Page 152 802.1x supplicant to authenticate to a server on the network. If using 802.1x authentication, enter the authentication server user name and password. The default password is “motorola.” For information on enabling and configuring authentication schemes on the access point, see Enabling Authentication and Encryption Schemes on page 6-4.
  • Page 153: Configuring Vlan Support

    Network Management full duplex Select this option to transmit data to and from the access point at the same time. Using full duplex, the access point can send data over its LAN port while receiving data as well. 6. Click Apply to save any changes to the LAN Configuration screen.
  • Page 154 AP-7131N-FGR Access Point Product Reference Guide Although static VLANs are the most common form of VLAN assignments, dynamic VLAN assignment is possible per WLAN. Configuring dynamic VLANs entail the access point sending a DHCP request for device information (such as an IP address). Additional information (such as device MAC address information) is sent to the access point.
  • Page 155 Network Management The VLAN name screen displays. The first time the screen is launched a default VLAN name of 1 and a default VLAN ID of 1 display. The VLAN name is auto-generated once the user assigns a VLAN ID. However, the user has the option of re-assigning a name to the VLAN using New VLAN Edit VLAN...
  • Page 156 5. Define a 32 character maximum VLAN Name. Enter a unique name that identifies members of the VLAN. Motorola recommends selecting the name carefully, as the VLAN name should signify a group of clients with a common set of requirements independent of their physical location.
  • Page 157: Configuring Lan1 And Lan2 Settings

    By default, the access point forwards untagged traffic with the native VLAN configured for the port. The Native VLAN is VLAN 1 by default. Motorola suggests leaving the Native VLAN set to 1 as other layer 2 devices also have their Native VLAN set to 1.
  • Page 158 5-10 AP-7131N-FGR Access Point Product Reference Guide advanced DHCP settings for that LAN. For more information, see Configuring Advanced DHCP Server Settings on page 5-13. Additionally, LAN1 and LAN2 each have separate Type Filter submenu items used to prevent specific (an potentially unneccesary) frames from being processed, for more...
  • Page 159 Network Management 5-11 NOTE Motorola recommends the WAN and LAN ports should not both be configured as DHCP clients. This interface is a Select this button to enable DHCP to set network address DHCP Client information via this LAN1 or LAN2 connection. This is recommended if the access point resides within a large corporate network or the Internet Service Provider (ISP) uses DHCP.
  • Page 160 Primary DNS Server Enter the Primary DNS numerical (non DNS name) IP address. Secondary DNS Motorola recommends entering the numerical IP address of an Server additional DNS server (if available), used if the primary DNS server goes down. A maximum of two DNS servers can be used.
  • Page 161: Configuring Advanced Dhcp Server Settings

    Network Management 5-13 3. Refer to the IP Filtering field to optionally enable the IP filtering feature, and (if enabled) apply existing IP filters (and their rules and permissions) to LAN1 or LAN2. Enable IP Filtering Selecting this checkbox allows the LAN to employ filter policies and rules to determine which IP packets are processed normally over the LAN and which are discarded.
  • Page 162 5-14 AP-7131N-FGR Access Point Product Reference Guide 1. Select Network Configuration -> -> LAN1 (or LAN2) from the access point menu tree. 2. Click the Advanced DHCP Server button from within the LAN1 LAN2 screen. 3. Specify a lease period in seconds for available IP addresses using the...
  • Page 163: Setting The Type Filter Configuration

    Network Management 5-15 7. Click Cancel to undo any changes made. Undo Changes reverts the settings displayed to the last saved configuration. 5.1.2.2 Setting the Type Filter Configuration Each access point LAN (either LAN1 or LAN2) can keep a list of frame types that it forwards or discards.
  • Page 164 5-16 AP-7131N-FGR Access Point Product Reference Guide 2. Use the all ethernet types, except drop-down menu to designate whether the Ethernet Types defined for the LAN are allowed or denied for use by the access point. 3. To add an Ethernet type, click the button.
  • Page 165: Configuring Wan Settings

    Packet types supported for the type filtering function include 16-bit DIX Ethernet types as well as Motorola proprietary types. Select an Ethernet type from the drop down menu, or enter the Ethernet type’s hexadecimal value. See your System Administrator if unsure of the implication of adding or omitting a type from the list for either LAN1 or LAN2.
  • Page 166 WAN IP Configuration field to enable the WAN interface, and set network address information for the WAN connection. NOTE Motorola recommends that the WAN and LAN ports should not both be configured as DHCP clients. Enable WAN Interface Select the...
  • Page 167 The ISP or a network administrator provides this address. A DNS server translates a domain name (for example, www.motorola.com) into an IP address that networks can use. Secondary DNS Specify the address of a secondary DNS server if one is used. A...
  • Page 168 5-20 AP-7131N-FGR Access Point Product Reference Guide More IP Addresses Click the More IP Addresses button to specify additional static IP addresses for the access point. Additional IP addresses are required when users within the WAN need dedicated IP addresses, or when servers need to be accessed (addressed) by the outside world.
  • Page 169 Network Management 5-21 half duplex Select this option to transmit data to and from the access point, but not at the same time. Using a half duplex transmission, the access point can send data over its WAN port then immediately receive data from the same direction in which the data was transmitted.
  • Page 170 5-22 AP-7131N-FGR Access Point Product Reference Guide Keep-Alive Select the Keep-Alive checkbox to maintain the WAN connection indefinitely (no timeout interval). Some ISPs terminate inactive connections. Enabling Keep-Alive keeps the access point’s WAN connection active, even when there is no traffic. If the ISP drops the connection after an idle period, the access point automatically re- establishes the connection to the ISP.
  • Page 171: Configuring Network Address Translation (Nat) Settings

    Network Management 5-23 5.2.1 Configuring Network Address Translation (NAT) Settings Network Address Translation (NAT) converts an IP address in one network to a different IP address or set of IP addresses in another network. The access point router maps its local (inside) network addresses to WAN (outside) IP addresses, and translates the WAN IP addresses on incoming packets to local IP addresses.
  • Page 172 5-24 AP-7131N-FGR Access Point Product Reference Guide 2. Configure the Address Mappings field to generate a WAN IP address, define the NAT type and set outbound/inbound NAT mappings. WAN IP Address The WAN IP addresses on the NAT screen are dynamically generated from address settings applied on the screen.
  • Page 173: Configuring Port Forwarding

    Network Management 5-25 Outbound Mappings When 1 to 1 NAT is selected, a single IP address can be entered in Outbound Mappings area. This address provides a 1 to 1 mapping of the WAN IP address to the specified IP address. When 1 to Many is selected as the NAT Type, the Outbound...
  • Page 174 5-26 AP-7131N-FGR Access Point Product Reference Guide 4. Configure the Port Forwarding screen to modify the following: Click to create a local map that includes the name, transport protocol, start port, end port, IP address and Translation Port for incoming packets.
  • Page 175: Configuring Dynamic Dns

    Network Management 5-27 IP Address Enter the numerical (non DNS name) IP address to which the specified service is forwarded. This address must be within the specified NAT range for the associated WAN IP address. Translation Port Specify the port number used to translate data for the service being forwarded.
  • Page 176 5-28 AP-7131N-FGR Access Point Product Reference Guide 2. Select the Enable checkbox to allow domain name information to be updated when the IP address associated with that domain changes. A username, password and hostname must be specified for domain name information to be updated.
  • Page 177: Enabling Wireless Lans (Wlans)

    Wireless Configuration screen to create new WLANs, edit the properties of existing WLANs or delete a WLAN to create space for a new WLAN. Sixteen WLANs are available on the AP-7131N-FGR. To configure WLANs on the access point: 1. Select Network Configuration ->...
  • Page 178 5-30 AP-7131N-FGR Access Point Product Reference Guide If a WLAN is defined, that WLAN displays within the Wireless Configuration screen. When the access point is first booted, WLAN1 exists as a default WLAN available immediately for connection. 2. Refer to the information within the Wireless Configuration screen to view the name, ESSID, access point radio designation, VLAN ID and security policy of existing WLANs.
  • Page 179 Network Management 5-31 Radio Radio field displays the name of the access point radio the WLAN is mapped to (either the 802.11a/n radio or the 802.11b/g/n radio). To change the radio designation for a specific WLAN, see Creating/Editing Individual WLANs on page 5-32.
  • Page 180: Creating/Editing Individual Wlans

    5-32 AP-7131N-FGR Access Point Product Reference Guide 5.3.1 Creating/Editing Individual WLANs If the WLANs displayed within the Wireless Configuration screen do not satisfy your network requirements, you can either create a new WLAN or edit the properties of an existing WLAN.
  • Page 181 Network Management 5-33 3. Set the parameters in the Configuration field as required for the WLAN. CAUTION When using the access point’s hotspot functionality, ensure MUs are re-authenticated when changes are made to the characteristics of a hotspot enabled WLAN, as MUs within the WLAN will be dropped from device association.
  • Page 182 5-34 AP-7131N-FGR Access Point Product Reference Guide ESSID Enter the Extended Services Set Identification (ESSID) associated with the WLAN. The WLAN name is auto-generated using the ESSID until changed by the user. The maximum number of characters that can be used for the ESSID is 32. Do not use any of the following characters for an ESSID <...
  • Page 183 Network Management 5-35 Enable Client Bridge Select the Enable Client Bridge Backhaul checkbox to make the Backhaul WLAN available in the WLAN drop-down menu within the Radio Configuration screen. This checkbox can be ignored for WLANs not supporting mesh networking, to purposely exclude them from the list of WLANs available in the Radio Configuration page selected specifically for mesh networking support.
  • Page 184 ESSID. If a hacker tries to find an ESSID via an MU, the ESSID does not display since the ESSID is not in the beacon. Motorola recommends keeping the option enabled to reduce the likelihood of hacking into the WLAN.
  • Page 185: Configuring Wlan Security Policies

    Network Management 5-37 IP Filtering Select the IP Filtering button to display a screen where existing IP filter policies can be applied to the WLAN to allow or deny IP packets in either an incoming or outgoing direction based on the rules defined for the policy.
  • Page 186: Configuring A Wlan Access Control List (Acl)

    Access Point Security on page 6-1 for more details on configuring access point security. For detailed information on the authentication and encryption options available specifically to AP-7131N-FGR model access points and how to configure them, see to Configuring Security Options on page 6-2.
  • Page 187 WLANs based on MU interoperability requirements. Motorola recommends using the New MU ACL Policy or Edit MU ACL Policy screens strategically to name and configure ACL policies meeting the requirements of the particular WLANs they may map to.
  • Page 188 5-40 AP-7131N-FGR Access Point Product Reference Guide 2. Click the Create button to configure a new ACL policy, or select a policy and click the Edit button to modify an existing ACL policy. The access point supports a maximum of 16 MU ACL...
  • Page 189 Network Management 5-41 Either the New MU ACL Policy Edit MU ACL Policy screens display. 3. Assign a name to the new or edited ACL policy that represents an inclusion or exclusion policy specific to a particular type of MU traffic you may want to use with a single or group of WLANs.
  • Page 190: Setting The Wlan Quality Of Service (Qos) Policy

    WLANs based on MU interoperability requirements. Motorola recommends using the New QoS Policy and Edit QoS Policy screens strategically to name and configure QoS policies meeting the requirements of the particular WLANs they may to. However, be careful not to name policies after specific WLANs, as individual QoS policies can be used by more than one WLAN.
  • Page 191 Network Management 5-43 NOTE When the access point is first launched, a single QoS policy (default) is available and mapped to WLAN 1. It is anticipated additional QoS policies will be created as the list of WLANs grows. 2. Click the Create button to configure a new QoS policy, or select a policy and click the Edit...
  • Page 192 5-44 AP-7131N-FGR Access Point Product Reference Guide 3. Assign a name to the new or edited QoS policy that makes sense to the access point traffic receiving priority. More than one WLAN can use the same QoS policy. 4. Select the Support Voice prioritization checkbox to allow legacy voice prioritization.
  • Page 193 11b voice Use this setting for “Voice-Over-IP” traffic over the 802.11b radio. CAUTION Motorola recommends using the drop-down menu to define the intended radio traffic within the WLAN. Once an option is selected, you do not need to adjust the values for the Access Categories, unless qualified to do so.
  • Page 194 5-46 AP-7131N-FGR Access Point Product Reference Guide 7. Select the Enable Wi-Fi Multimedia (WMM) QoS Extensions checkbox to configure the access point’s QoS Access Categories. The Access Categories are not configurable unless the checkbox is selected. Access Categories include: Background Backgrounds traffic is typically of a low priority (file transfers, print jobs ect.).
  • Page 195 Network Management 5-47 TXOPs Time 32usec TXOPs Time is the interval the transmitting MU is assigned for transmitting. The default for Background traffic is 0. The same TXOPs values should be used for either the 802.11a/n or 802.11b/g/n radio, there is no difference. TXOPs Time ms TXOP times range from 0.2 ms (background priority) to 3 ms (video priority) in a 802.11a/n network, and from 1.2 ms to 6 ms in an...
  • Page 196: Configuring Wlan Hotspot Support

    5-48 AP-7131N-FGR Access Point Product Reference Guide 5.3.1.4 Configuring WLAN Hotspot Support The access point enables hotspot operators to provide user authentication and accounting without a special client application. The access point uses a traditional Internet browser as a secure authentication device.
  • Page 197 Network Management 5-49 3. Refer to the HTTP Redirection field to specify how the Login, Welcome, and Fail pages are maintained for this specific WLAN. The pages can be hosted locally or remotely Use Default Files Select the Use Default Files checkbox if the login, welcome and fail pages reside on the access point.
  • Page 198 5-50 AP-7131N-FGR Access Point Product Reference Guide Use External URL Select the Use External URL checkbox to define a set of external URLs for hotspot users to access the login, welcome and fail pages. To create a redirected page, you need to have a TCP termination locally.
  • Page 199 Network Management 5-51 NOTE The Enable Hotspot User Timeout option is only available if using the access point’s internal Radius Server for user authentication. 6. Click the White List Entries button (within the WhiteList Configuration field) to create a set of allowed destination IP addresses. These allowed destination IP addresses are called a White List.
  • Page 200 5-52 AP-7131N-FGR Access Point Product Reference Guide 8. Refer to the Radius Configuration field to define a primary and secondary Radius server port and shared secret password. Select mode Use the Select mode drop-down menu to define whether an Internal or External server is to be used for the primary server.
  • Page 201 Network Management 5-53 When a client requests a URL from a Web server, the login handler returns an HTTP redirection status code (for example, 301 Moved Permanently), which indicates to the browser it should look for the page at another URL. This other URL can be a local or remote login page (based on the hotspot configuration).
  • Page 202: Setting The Wlan's Radio Configuration

    802.11a (or a/n) use and the other for 802.11b/g (or b/g/n) support. The new AP-7131N-FGR model access point is available in two different dual radio models. The two models available to the AP-7131N-FGR series include: •...
  • Page 203 Network Management 5-55 • Live View- The WIPS application (commonly referred to as Motorola Enterprise) provides a live view of the sensors, APs and MUs operating in a WLAN. Live view support exists throughout the WIPS application, wherever a device icon appears in an information panel or navigation tree.
  • Page 204 2. Set the Maximum MUs between 0 - 127. The maximum number of MUs that can associate to an AP-7131N-FGR is 127. Therefore, the possible number of MUs that can associate to each radio must be negotiated between 0 and 127.
  • Page 205 WLAN (ESS) the client bridge uses to establish a wireless link. The default setting, is (WLAN1). Motorola recommends creating (and naming) a WLAN specifically for mesh networking support to differentiate the Mesh supported WLAN from non-Mesh supported WLANs.
  • Page 206 5-58 AP-7131N-FGR Access Point Product Reference Guide Disabled When disabled, both radios are up at boot time and beaconing. If one radio (radio 1) does not have a mesh connection, the other radio (radio 2) is not affected. Radio 2 continues to beacon and associate MUs, but MU's can only communicate amongst themselves using the access point.
  • Page 207: Configuring The 802.11A/N Or 802.11B/G/N Radio

    Network Management 5-59 CAUTION When defining a Mesh configuration and changes are saved, the mesh network temporarily goes down. The Mesh network is unavailable because the access point radio is reconfigured when applying changes. This can be problematic for users making changes within a deployed mesh network.
  • Page 208 5-60 AP-7131N-FGR Access Point Product Reference Guide 2. Configure the Properties field to assign a name and placement designation for the radio. Placement Use the Placement drop-down menu to specify whether the radio is located outdoors or indoors. Default placement depends on the country of operation selected for the access point.
  • Page 209 Network Management 5-61 ERP Protection Extended Rate PHY (ERP) allows 802.11g MUs to interoperate with 802.11b only MUs. ERP Protection is managed automatically by the access point and informs users when 802.11b MUs are present within the access point’s coverage area. The presence of 802.11b MUs within the 802.11g coverage area negatively impacts network performance, so this feature should looked to as an indicator of why network performance has been degraded.
  • Page 210 5-62 AP-7131N-FGR Access Point Product Reference Guide Channel Width Select the Channel Width (MHz) from the drop-down menu. The AP radio can support 20 and 40 MHz channel widths. 20 MHz is the default setting for the 2.4 GHz radio. 20/40 MHz operation (the...
  • Page 211 Network Management 5-63 Set Rates Click the Set Rates button to define minimum and maximum data transmit rates for the radio. Use the Basic Rates drop-down menu to select the rates available for either the 2.4 GHz or 5 GHz radio band. The menu options differ, based on the radio band.
  • Page 212 5-64 AP-7131N-FGR Access Point Product Reference Guide 4. Configure the Performance field to set the preamble, thresholds values and QoS values for the radio.
  • Page 213 (as created or edited from the Quality of Service Configuration screen). Motorola recommends only advanced users manually set these values. If the type of data-traffic is known, use the drop-down menu to select an option representative of the intended radio band support.
  • Page 214 5-66 AP-7131N-FGR Access Point Product Reference Guide Enable Transmit A-MSDU Set Aggregation Select the checkbox (within the A-MSDU Aggregation field) to enable the aggregation of MAC Service frames. When enabled, long frames can be both sent and received (up to 4 KB). The A-MSDU buffer limit is not user configurable.
  • Page 215 Motorola recommends decreasing the DTIM interval for that specific BSSID. However, decreasing the DTIM interval decreases the battery life on power save stations. The default is 10 for each BSSID. Motorola recommends using the default value unless qualified to understand the performance risks of changing it.
  • Page 216 5-68 AP-7131N-FGR Access Point Product Reference Guide 6. Refer to the QBSS Load Element Settings field to determine whether channel usage data is transmitted to associated devices. Enable QBSS load When enabled, the access point communicates channel usage data element to associated devices using an interval you define.
  • Page 217 BSSID, as this will result in warning or error messages. NOTE When using a AP-7131N-FGR dual-radio access point, 4 BSSIDs for the 802.11b/g/n radio and 4 BSSIDs for the 802.11a/n radio are available.
  • Page 218: Configuring Mu Rate Limiting

    5-70 AP-7131N-FGR Access Point Product Reference Guide 11. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout before the applet is closed. 5.3.3 Configuring MU Rate Limiting Use the Rate Limiting screen to control the MU rate limit allotted to individual WLANs. MU rate limiting enables an administrator to determine how much radio bandwidth is allowed to each MU within any one of the 16 supported AP WLANs.
  • Page 219: Configuring Router Settings

    Network Management 5-71 Once enabled, MU rate limiting still needs to be enabled for a specific WLAN, then the rate limit allocation needs to be defined for MU traffic within that specific WLAN. To modify a WLAN-to-radio assignment, see Creating/Editing Individual WLANs on page 5-32.
  • Page 220 5-72 AP-7131N-FGR Access Point Product Reference Guide 2. Refer to the access point Router Table field to view existing routes. The access point Router Table field displays a list of connected routes between an enabled subnet and the router. These routes can be changed by modifying the IP address and subnet masks of the enabled subnets.
  • Page 221 Network Management 5-73 select the type of RIP and the type of RIP authentication used by the switch. For more information on configuring RIP, see Setting the RIP Configuration on page 5-74. 5. Use the User Defined Routes field to add or delete static routes. The User Defined Routes field allows the administrator to view, add or delete internal static (dedicated) routes.
  • Page 222: Setting The Rip Configuration

    5-74 AP-7131N-FGR Access Point Product Reference Guide 5.4.1 Setting the RIP Configuration To set the RIP configuration: 1. From within the RIP Configuration field, select the RIP Type from the drop-down menu. The following options are available: No RIP No RIP option prevents the access point’s router from...
  • Page 223 Network Management 5-75 3. If RIP v2 or RIP v2 (v1 compat) is the selected RIP type, the RIP v2 Authentication field becomes active. Select the type of authentication to use from the Authentication Type drop-down menu. Available options include: None This option disables the RIP authentication.
  • Page 224: Configuring Ip Filtering

    5-76 AP-7131N-FGR Access Point Product Reference Guide 4. If the Simple authentication method is selected, specify a password of up to 15 alphanumeric characters in the Password (Simple Authentication) area. 5. If the MD5 authentication method is selected, fill in the Key #1 field (Key #2 is optional).
  • Page 225 Network Management 5-77 • Packets are compared with lines of the filter policy list until a match is made. Once a packet matches a line of the list, it's acted upon, and no further comparisons take place. If inspected packets are determined to not be IP packets, it permitted by the access point for its inbound or outbound destination.
  • Page 226 5-78 AP-7131N-FGR Access Point Product Reference Guide NOTE With IP Filtering, users can only define a destination port, not a source port. 2. Click the button to define the attributes of a new IP Filtering policy. The following policy (or filtering rule) attributes require definition.
  • Page 227: Applying A Filter To Lan1, Lan2 Or A Wlan (1-16)

    Network Management 5-79 In Use Displays YES if the listed filter policy is currently being utilized by LAN1, LAN2 or a WLAN. NO is displayed if the listed policy is currently not be utilized by either of the LAN ports or any of the access point’s 16 WLANs.
  • Page 228 5-80 AP-7131N-FGR Access Point Product Reference Guide c. Select the Enable IP Filtering button in the lower portion of the screen. d. Select the IP Filtering button. The screen displays with both the Default Incoming Deny Default Outgoing Deny checkboxes selected by default. Consequently, if you enable IP filtering but do not apply any filters that allow IP traffic, then no IP traffic will be forwarded, as the default deny settings have precedence.
  • Page 229: Chapter 6. Configuring Access Point Security

    Configuring Access Point Security Security measures for the AP-7131N-FGR and its WLANs are critical. Use the available AP-7131N-FGR security options to protect the access point LAN from wireless vulnerabilities, and safeguard the transmission of RF packets between the access point and its associated MUs.
  • Page 230: Configuring Security Options

    NOTE Security for the access point can be configured in various locations throughout the access point menu structure. This chapter outlines the security options available to the AP-7131N-FGR, and the menu locations and steps required to configure specific security measures.
  • Page 231 NOTE DNS names are not supported as a valid IP address for the access point. The user is required to enter a numerical IP address. 4. Log in using the “admin” as the default Username and “motorola” as the default Password.
  • Page 232: Resetting The Access Point Password

    To contact Motorola Support in the event of a password reset requirement, go to http://www.symbol.com/contactsupport CAUTION Only a qualified installation professional should set or restore the access point’s radio and power management configuration in the...
  • Page 233 Remember, multiple WLANs can share the same security policy, so be careful not to name security policies after specific WLANs or risk defining a WLAN to single policy. Motorola recommends naming the policy after the attributes of the authentication or encryption type selected.
  • Page 234: Configuring 802.1X Eap Settings

    6. Click to keep changes made within the New Security Policy screen (if any). Apply Configure AP-7131N-FGR encryption or authentication security policies by referring to the following: access point authentication: • To define a security policy supporting 802.1x EAP, see Configuring 802.1x EAP Settings...
  • Page 235 Configuring Access Point Security If security policies supporting 802.1x EAP exist, they appear within the Security Configuration screen. These existing policies can be used as is, or their properties edited by clicking the Edit button. To configure a new security policy supporting 802.1x EAP, continue to step 2.
  • Page 236 AP-7131N-FGR Access Point Product Reference Guide 6. Configure the Server Settings field as required to define address information for the authentication server. The appearance of the Server Settings field varies depending on whether Internal or External has been selected from the Radius Server drop-down menu.
  • Page 237 Configuring Access Point Security RADIUS Port If using an External Radius Server, specify the port on which the primary Radius server is listening. Optionally, specify the port of a secondary (failover) server. Older Radius servers listen on ports 1645 and 1646. Newer servers listen on ports 1812 and 1813. Port 1645 or 1812 is used for authentication.
  • Page 238 6-10 AP-7131N-FGR Access Point Product Reference Guide 7. Select the Accounting tab as required to define a timeout period and retry interval Syslog for MUs interoperating with the access point and EAP authentication server. The items within this tab could be enabled or disabled depending on whether Internal or External has been selected from the Radius Server drop-down menu.
  • Page 239 Configuring Access Point Security 6-11 Max. Retries (1-99) Define the maximum number of MU retries to reauthenticate after retries failing to complete the EAP process. Failure to reauthenticate in the specified number of retries results in a terminated connection. The default is 2 retries.
  • Page 240: Configuring Wpa2-Ccmp (802.11I)

    6-12 AP-7131N-FGR Access Point Product Reference Guide 6.5 Configuring WPA2-CCMP (802.11i) WPA2 is a newer 802.11i standard that provides even stronger wireless security than Wi-Fi Protected Access (WPA). CCMP is the security standard used by the Advanced Encryption Standard (AES).
  • Page 241 Configuring Access Point Security 6-13 5. Configure the Key Rotation Settings field as required to set Broadcast Key Rotation and the update interval. Broadcast Key Select the Broadcast Key Rotation checkbox to enable or disable Rotation broadcast key rotation. When enabled, the key indices used for encrypting/decrypting broadcast traffic will be alternatively rotated on every interval specified in the Broadcast Key Rotation Interval.
  • Page 242: Configuring Firewall Settings

    6-14 AP-7131N-FGR Access Point Product Reference Guide 6. Configure the Key Settings area as needed to set a 256-bit key. 256-bit Key Enter 16 hexadecimal characters into each of the four fields displayed. Default (hexadecimal) 256-bit keys for WP2A/CCMP include:...
  • Page 243 Configuring Access Point Security 6-15 Use the access point’s Firewall screen to enable or disable the configurable firewall filters. Enable each filter for maximum security. Disable a filter if the corresponding attack does not seem a threat in order to reduce processor overhead. Use the WLAN Security screens as required for setting user authentication and data encryption parameters.
  • Page 244 6-16 AP-7131N-FGR Access Point Product Reference Guide 3. Refer to the field to define a timeout interval to terminate IP address Timeout Configuration translations. NAT Timeout Network Address Translation (NAT) converts an IP address in one network to a different IP address or set of IP addresses in a different network.
  • Page 245: Configuring Lan To Wan Access

    Configuring Access Point Security 6-17 6. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings displayed on the Firewall screen to the last saved configuration. 7. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout before the applet is closed.
  • Page 246 6-18 AP-7131N-FGR Access Point Product Reference Guide 3. Configure the Rules field as required to allow or deny access to selected (enabled) protocols. Allow or Deny all Use the drop-down menu to select either Allow Deny. protocols, except selected setting applies to all protocols except those with enabled checkboxes and any traffic that is added to the table.
  • Page 247 Configuring Access Point Security 6-19 Pre configured Rules The following protocols are preconfigured with the access point. To enable a protocol, check the box next to the protocol name. • HTTP - Hypertext Transfer Protocol is the protocol for transferring files on the Web. HTTP is an application protocol running on top of the TCP/IP suite of protocols, the foundation protocols for the Internet.
  • Page 248: Available Protocols

    6-20 AP-7131N-FGR Access Point Product Reference Guide End Port Enter the ending port number for a port range. If the protocol uses a single port, leave the field blank. A new entry might use Web Traffic for its name, TCP for its protocol, and 80 for its port number.
  • Page 249: Configuring Advanced Subnet Access

    Configuring Access Point Security 6-21 between two end points. ESP can also be used in tunnel mode, providing security like that of a Virtual Private Network (VPN). • GRE - General Routing Encapsulation supports VPNs across the Internet. GRE is a mechanism for encapsulating network layer protocols over any other network layer protocol.
  • Page 250 6-22 AP-7131N-FGR Access Point Product Reference Guide 2. Configure the Settings field as needed to override the settings in the Subnet Access screen and import firewall rules into the Advanced Subnet Access screen. Override Subnet Select this checkbox to enable advanced subnet access rules and...
  • Page 251: Configuring Vpn Tunnels

    Configuring Access Point Security 6-23 Source IP Source IP range defines the origin address or address range for the firewall rule. To configure the Source IP range, click on the field. A new window displays for entering the IP address and range. Destination IP Destination IP range determines the target address or...
  • Page 252 6-24 AP-7131N-FGR Access Point Product Reference Guide When connecting to another site using a VPN, the traffic is encrypted so if anyone intercepts the traffic, they cannot see what it is unless they can break the encryption. The traffic is encrypted from your computer through the network to the VPN.
  • Page 253 Configuring Access Point Security 6-25 Click to delete a highlighted VPN tunnel. There is no confirmation before deleting the tunnel. Tunnel Name Tunnel Name column lists the name of each VPN tunnel on access point Remote Subnet Remote Subnet column lists the remote subnet for each tunnel.
  • Page 254 6-26 AP-7131N-FGR Access Point Product Reference Guide Tunnel Name Enter a name to define the VPN tunnel. The tunnel name is used to uniquely identify each tunnel. Select a name best suited to that tunnel’s function so it can be selected again in the future if required in a similar application.
  • Page 255: Creating A Vpn Tunnel Between Two Access Points

    Configuring Access Point Security 6-27 Auto Key Settings Select the Auto (IKE) Key Exchange checkbox, and click the Auto Key Settings button to open a screen where AH authentication and ESP encryption/authentication can be configured. For more information, see Configuring Auto Key Settings on page 6-33.
  • Page 256 6-28 AP-7131N-FGR Access Point Product Reference Guide 1. Ensure the WAN ports are connected via the internet 2. Select Network Configuration -> -> from the access point menu tree. 3. Enter any tunnel name (tunnel names do not need to match).
  • Page 257: Configuring Manual Key Settings

    Configuring Access Point Security 6-29 Notice the status displays "NOT_ACTIVE". This screen automatically refreshes to get the current status of the VPN tunnel. Once the tunnel is active, the IKE_STATE changes from NOT_CONNECTED to SA_MATURE. 19. On AP #2, repeat the same steps as above. However, replace AP #2 information with AP #1 information.
  • Page 258 6-30 AP-7131N-FGR Access Point Product Reference Guide set, specify just an ESP encryption transform or both an ESP encryption transform and an ESP authentication transform. When the particular transform set is used during negotiations for IPSec SAs, the entire transform set (the combination of protocols, algorithms, and other settings) must match a transform set at the remote end of the gateway.
  • Page 259 Configuring Access Point Security 6-31 3. Configure the Manual Key Settings screen to modify the following: NOTE When entering Inbound or Outbound encryption or authentication keys, an error message could display stating the keys provided are “weak”. Some attack tools invoke a dictionary to hack keys based on commonly used words.
  • Page 260 6-32 AP-7131N-FGR Access Point Product Reference Guide ESP Type ESP provides packet encryption, optional data authentication and anti-replay services for the VPN tunnel. Use the drop-down menu to select the ESP type. Options include: • ESP - Enables ESP for the tunnel.
  • Page 261: Configuring Auto Key Settings

    Configuring Access Point Security 6-33 Inbound SPI (Hex) Define an (up to) six-character (maximum) hexadecimal value to identify the inbound security association created by the encryption algorithm. The value must match the corresponding outbound SPI value configured on the remote security gateway. Outbound SPI (Hex) Enter an (up to) six-character (maximum) hexadecimal value to identify the outbound security association created by the...
  • Page 262 6-34 AP-7131N-FGR Access Point Product Reference Guide 3. Configure the Auto Key Settings screen to modify the following: Use Perfect Forward Forward secrecy is a key-establishment protocol guaranteeing the Secrecy discovery of a session key or long-term private key does not compromise the keys of other sessions.
  • Page 263 Configuring Access Point Security 6-35 ESP Type ESP provides packet encryption, optional data authentication and anti-replay services for the VPN tunnel. Use the drop-down menu to select the ESP type. • ESP - Enables ESP for this tunnel. • ESP with Authentication - Enables ESP with authentication. ESP Encryption Use this menu to select the encryption and authentication Algorithm...
  • Page 264: Configuring Ike Key Settings

    6-36 AP-7131N-FGR Access Point Product Reference Guide 6.7.4 Configuring IKE Key Settings The Internet Key Exchange (IKE) is an IPsec standard protocol used to ensure security for VPN negotiation and remote host or network access. IKE provides an automatic means of negotiation and authentication for communication between two or more parties.
  • Page 265 • FQDN - Select FQDN if the remote ID type is a fully qualified domain name (such as sj.motorola.com). The setting for this field does not have to be fully qualified, however it must match the setting for the Certificate Authority.
  • Page 266 6-38 AP-7131N-FGR Access Point Product Reference Guide IKE Authentication IKE provides data authentication and anti-replay services for the Algorithm VPN tunnel. • SHA1 - Enables Secure Hash Algorithm. No keys are required to be manually provided. IKE Authentication If you selected...
  • Page 267: Viewing Vpn Status

    Configuring Access Point Security 6-39 5. Click Cancel to return to the VPN screen without retaining the changes made to the Settings screen. 6.7.5 Viewing VPN Status Use the VPN Status screen to display the status of the tunnels configured on the access point as well as their lifetime, transmit and receive statistics.
  • Page 268 6-40 AP-7131N-FGR Access Point Product Reference Guide Status Status column lists the status of each configured tunnel. When the tunnel is not in use, the status reads NOT_ACTIVE. When the tunnel is connected, the status reads ACTIVE. Outb SPI Outb SPI column displays the outbound Security Parameter Index (SPI) for each tunnel.
  • Page 269: Configuring Content Filtering Settings

    Configuring Access Point Security 6-41 Remaining Life Lists the remaining life of the current IKE key for each tunnel. When the remaining life on the IKE key reaches 0, IKE initiates a negotiation for a new key. IKE keys associated with a renegotiated tunnel.
  • Page 270 6-42 AP-7131N-FGR Access Point Product Reference Guide 2. Configure the HTTP field to configure block Web proxies and URL extensions. Block Outbound HTTP HyperText Transport Protocol (HTTP) is the protocol used to transfer information to and from Web sites. HTTP Blocking allows for...
  • Page 271 Configuring Access Point Security 6-43 Block Outbound SMTP Simple Mail Transport Protocol (SMTP) is the Internet standard for Commands host-to-host mail transport. SMTP generally operates over TCP on port 25. SMTP filtering allows the blocking of any or all outgoing SMTP commands.
  • Page 272: Configuring Rogue Ap Detection

    It is possible that not all of the devices identified by the access point are operating legitimately within the access point’s radio coverage area. A rogue AP is a device located nearby an authorized Motorola access point but recognized as having properties rendering its operation illegal and threatening to the access point and the LAN.
  • Page 273 Configuring Access Point Security 6-45 The rogue detection interval is used in conjunction with Motorola MUs that identify themselves as rogue detection capable to the access point. The detection interval defines how often the access point requests these MUs to scan for a rogue AP. A shorter interval can affect the performance of the MU, but it will also decrease the time it takes for the access point to scan for a rogue AP.
  • Page 274 6-46 AP-7131N-FGR Access Point Product Reference Guide CAUTION Users cannot define a rogue detection method when one of the access point radios is functioning as a WIPS sensor. To use one of the radios as a detector, you must disable WIPS sensor mode first, then set a radio for the desired detection method.
  • Page 275 3. Use the field to restrict Motorola AP’s from Rogue AP detection and create Allowed AP List a list of device MAC addresses and ESSID’s approved for interoperability with the access point.
  • Page 276: Moving Rogue Aps To The Allowed Ap List

    6-48 AP-7131N-FGR Access Point Product Reference Guide Del (Delete) Click the Delete button to remove the highlighted line from the Rule Management field. The MAC and ESS address information previously defined is no longer applicable unless the previous configuration is restored.
  • Page 277 Configuring Access Point Security 6-49 The Active APs screen displays with detected rogue devices displayed within the Rogue table. 2. Enter a value (in minutes) in the Allowed APs field to indicate the number of Age Out Time elapsed minutes before an AP will be removed from the approved list and reevaluated. A zero (0) for this value (default value) indicates an AP can remain on the approved AP list permanently.
  • Page 278: Displaying Rogue Ap Details

    7. To remove the Rogue AP entries displayed within the e Rogue APs field, click the Clear Rogue AP List button. Motorola only recommends clearing the list of Rogue APs when the devices displaying within the list do not represent a threat to the access point managed network. 8. Click Apply to save any changes to the Active APs screen.
  • Page 279 BSSID/MAC Displays the MAC address of the rogue AP. This information could be useful if the MAC address is determined to be a Motorola MAC address and the device is interpreted as non-hostile and the device should be defined as an allowed AP.
  • Page 280: Using Mus To Detect Rogue Devices

    6-52 AP-7131N-FGR Access Point Product Reference Guide Detection Method Displays the RF Scan by RF On-Channel Detection Scan by Detector Radio method selected from the Rogue AP screen to detect rogue devices. For information on detection methods, see Configuring Rogue AP Detection on page 6-44.
  • Page 281 Configuring Access Point Security 6-53 2. Highlight an MU from within the Rogue AP enabled MUs field and click the scan button. The target MU begins scanning for rogue devices using the detection parameters defined within the Rogue AP Detection screen. To modify the detection parameters, see Configuring Rogue AP Detection on page 6-44.
  • Page 282: Configuring User Authentication

    6-54 AP-7131N-FGR Access Point Product Reference Guide 5. Highlight a different MU from the Rogue AP enabled MUs field as needed to scan for additional rogue APs. 6. Click Logout to return to the Rogue AP Detection screen. 6.10 Configuring User Authentication The access point can work with external Radius and LDAP Servers (AAA Servers) to provide user database information and user authentication.
  • Page 283 Configuring Access Point Security 6-55 2. From within the Data Source Configuration field, use the Data Source drop-down menu to select the data source for the Radius server. Local An internal user database serves as the data source. Use the User Database screen to enter the user data.
  • Page 284 6-56 AP-7131N-FGR Access Point Product Reference Guide 3. Use the TTLS/PEAP Configuration field to specify the Radius Server default EAP type, EAP authentication type and a Server or CA certificate (if used). EAP Type Use the EAP Type checkboxes to enable the default EAP type(s) for the Radius server.
  • Page 285 Configuring Access Point Security 6-57 Default Specify a PEAP and/or TTLS Authentication Type for EAP to use Authentication Type from the drop-down menu to the right of each checkbox item. PEAP options include: • GTC - EAP Generic Token Card (GTC) is a challenge handshake authentication protocol using a hardware token card to provide the response string.
  • Page 286: Configuring Ldap Authentication

    6-58 AP-7131N-FGR Access Point Product Reference Guide WARNING! If you have imported a Server or CA certificate, the certificate will not be saved when updating the access point’s firmware. Export your certificates before upgrading the access point’s firmware. From the...
  • Page 287 Radius server is used for group policy configuration to support a new Time Based Rule restriction feature. NOTE The LDAP screen displays with unfamiliar alphanumeric characters (if new to LDAP configuration). Motorola recommends only qualified administrators change the default values within the LDAP screen.
  • Page 288 6-60 AP-7131N-FGR Access Point Product Reference Guide 2. Enter the appropriate information within the LDAP Configuration field to allow the access point to interoperate with the LDAP server. Consult with your LDAP server administrator for details on how to define the values in this screen.
  • Page 289: Configuring A Proxy Radius Server

    Configuring Access Point Security 6-61 Bind Distinguished Specify the distinguished name used to bind with the LDAP server. Name Password Enter a valid password for the LDAP server. Base Distinguished Enter a name that establishes the base object for the search. The Name base object is the point in the LDAP tree at which to start searching.
  • Page 290 6-62 AP-7131N-FGR Access Point Product Reference Guide CAUTION When configuring the credentials of an MU, ensure its login (or user) name is a Fully Qualified Domain Name (FQDN), or it cannot be authenticated by the access point’s proxy server. For example;...
  • Page 291: Managing The Local User Database

    Configuring Access Point Security 6-63 Retry Count Enter a value between 3 and 6 to indicate the number of times the access point attempts to reach a proxy server before giving up. Timeout Enter a value between 5 and 10 to indicate the number of elapsed seconds causing the access point to time out on a request to a proxy server.
  • Page 292 6-64 AP-7131N-FGR Access Point Product Reference Guide 1. Select -> User Authentication -> User Database from the menu System Configuration tree. Refer to the Groups field for a list of all groups in the local Radius database. The groups are listed in the order added.
  • Page 293: Mapping Users To Groups

    Configuring Access Point Security 6-65 6. Click the Password cell. A small window displays. Enter a password for the user and click to return to the Users screen. 7. Click the List of Groups cell. A new screen displays enabling you to associate groups with the user.
  • Page 294 6-66 AP-7131N-FGR Access Point Product Reference Guide 3. To add the user to a group, select the group in the Available list (on the right) and click the <-Add button. Assigned users will display within the Assigned table. Map one or more groups as needed for group authentication access for this particular user.
  • Page 295: Defining User Access Permissions By Group

    Configuring Access Point Security 6-67 6.10.5 Defining User Access Permissions by Group An external AAA server maintains the users and groups database used by the access point for access permissions. Various kinds of access policies can be applied to each group. Individual groups can be associated with their own time-based access policy.
  • Page 296 6-68 AP-7131N-FGR Access Point Product Reference Guide The Access Policy screen displays the following fields: Groups Groups field displays the names of those existing groups that can have access intervals applied to them. Click the Edit button to display a screen designed to create access intervals for specific days and hours.
  • Page 297: Editing Group Access Permissions

    Configuring Access Point Security 6-69 Associated WLANs Associated WLANs field displays the WLANs assigned the user group access permissions listed within the filters and grid fields. Add additional WLANs to a group by selecting the Edit button within the groups field. grid Refer to the grid...
  • Page 298 6-70 AP-7131N-FGR Access Point Product Reference Guide 4. Define up to 10 access policies for the selected group within the Time Based Access Policy field. Use the drop-down menus on the left-hand side of the screen to define the day of the week for which each policy applies.
  • Page 299 Configuring Access Point Security 6-71 NOTE Groups have a strict start and end time (as defined using the Edit Access Policy screen). Only during this period of time can authentication requests from users be honored (with no overlaps). Any authentication request outside of this defined interval is denied regardless of whether a user’s credentials match or not.
  • Page 300 6-72 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 301: Chapter 7. Monitoring Statistics

    Monitoring Statistics The access point has functionality to display robust transmit and receive statistics for its WAN and LAN port. Wireless Local Area Network (WLAN) stats can also be displayed collectively for each enabled WLAN as well as individually for up to 16 specific WLANs. Transmit and receive statistics can also be displayed for the access point’s 802.11a/n and 802.11b/g/n radios.
  • Page 302: Viewing Wan Statistics

    AP-7131N-FGR Access Point Product Reference Guide See the following sections for more details on viewing statistics for the access point: • Viewing WAN Statistics • Viewing LAN Statistics • Viewing Wireless Statistics • Viewing Radio Statistics Summary • Viewing MU Statistics Summary •...
  • Page 303 Monitoring Statistics 2. Refer to the Information field to reference the following access point WAN data: Status Status field displays Enabled if the WAN interface is enabled on the screen. If the WAN interface is disabled on the WAN screen, the WAN Stats screen displays no connection information and statistics.
  • Page 304 AP-7131N-FGR Access Point Product Reference Guide Mask Mask field displays the subnet mask number for the access point’s WAN connection. This value is set on the screen. Refer to Configuring WAN Settings on page 5-17 to change the subnet mask.
  • Page 305 Monitoring Statistics RX Frame RX Frame field displays the number of TCP/IP data frame errors received. 4. Refer to the Transmitted field to reference data received over the access point WAN port. TX Packets TX packets are data packets sent over the WAN connection. The displayed number is a cumulative total since the WAN was last enabled or the access point was last restarted.
  • Page 306: Viewing Lan Statistics

    AP-7131N-FGR Access Point Product Reference Guide 7.2 Viewing LAN Statistics Use the LAN Stats screen to monitor the activity of the access point’s LAN1 or LAN2 connection. The Information field of the LAN Stats screen displays network traffic information as monitored over the access point LAN1 or LAN2 port.
  • Page 307 Monitoring Statistics Status Displays whether this particular LAN has been enabled as viable subnet from within the LAN Configuration screen. IP Address The Internet Protocol (IP) addresses for the access point LAN port. Network Mask The first two sets of numbers specify the network domain, the next set specifies the subset of hosts within a larger network.
  • Page 308 AP-7131N-FGR Access Point Product Reference Guide RX Errors RX errors include dropped data packets, buffer overruns, and frame errors on inbound traffic. The number of RX errors is a total of RX Dropped, RX Overruns and RX Carrier errors. Use this information to determine performance quality of the current LAN connection.
  • Page 309: Viewing A Lan's Stp Statistics

    Monitoring Statistics TX Carrier TX Carrier field displays the number of TCP/IP data carrier errors. 5. Click the Clear LAN Stats button to reset each of the data collection counters to zero in order to begin new data collections. The RX/TX Packets and RX/TX Bytes totals remain at their present values and are not cleared.
  • Page 310 7-10 AP-7131N-FGR Access Point Product Reference Guide 2. Refer to the Spanning Tree Info field to for details on spanning tree state, and root access point designation. Spanning Tree State Displays whether the spanning tree state is currently enabled or disabled.
  • Page 311 Monitoring Statistics 7-11 Root Path Cost Bridge message traffic contains information identifying the root bridge and the sending bridge. The root path cost represents the distance (cost) from the sending bridge to the root bridge. Bridge Max Msg. Age The Max Msg Age measures the age of received protocol information recorded for a port, and to ensure the information is discarded when it exceeds the value set for the Maximum Message age timer.
  • Page 312: Viewing Wireless Statistics

    7-12 AP-7131N-FGR Access Point Product Reference Guide Designated Bridge There is only one root bridge within each mesh network. All other bridges are designated bridges that look to the root bridge for several mesh network timeout values. For information on root and...
  • Page 313 Monitoring Statistics 7-13 2. Refer to the WLAN Summary field to reference high-level data for each enabled WLAN. Name Displays the names of all the enabled WLANs on the access point. For information on enabling a WLAN, see Enabling Wireless LANs (WLANs) on page 5-29.
  • Page 314 7-14 AP-7131N-FGR Access Point Product Reference Guide % NU Displays a percentage of the total packets for each active WLAN that are non-unicast. Non-unicast packets include broadcast and multicast packets. Retries Displays the average number of retries per packet. An excessive number could indicate possible network or hardware problems.
  • Page 315: Viewing Wlan Statistics

    Monitoring Statistics 7-15 7.3.1 Viewing WLAN Statistics Use the WLAN Stats screen to view detailed statistics for individual WLANs.The WLAN Stats screen is separated into four fields; Information, Traffic, RF Status, and Errors. The Information field displays basic information such as number of associated Mobile Units, ESSID and security information.
  • Page 316 7-16 AP-7131N-FGR Access Point Product Reference Guide ESSID Displays the Extended Service Set ID (ESSID) for the target WLAN. Radio/s Displays the name of the 802.11a/n or 802.11b/g/n radio the target WLAN is using for access point transmissions. Authentication Type Displays the authentication type defined for the WLAN.
  • Page 317 Monitoring Statistics 7-17 Avg. Bit Speed Total column displays the average bit speed in Mbps for a given time period on the selected WLAN.This includes all packets that are sent and received. The number in black represents statistics for the last 30 seconds and the number in blue represents statistics for the last hour.
  • Page 318: Viewing Radio Statistics Summary

    7-18 AP-7131N-FGR Access Point Product Reference Guide Dropped Packets Displays the percentage of packets which the AP gave up on for all MUs associated with the selected WLAN. The number in black represents this statistic for the last 30 seconds and the number in blue represents this statistic for the last hour.
  • Page 319 Monitoring Statistics 7-19 2. Refer to the Radio Summary field to reference access point radio information. Type Displays the type of radio (either 802.11a/n or 802.11b/g/n) currently deployed by the access point. To configure the radio type, Setting the WLAN’s Radio Configuration on page 5-54.
  • Page 320: Viewing Radio Statistics

    7-20 AP-7131N-FGR Access Point Product Reference Guide % NU Displays the percentage of the total packets that are non-unicast. Non-unicast packets include broadcast and multicast packets. Retries Displays the average number of retries per packet on each radio. A high number could indicate network or hardware problems.
  • Page 321 Monitoring Statistics 7-21 2. Refer to the Information field to view the access point 802.11a/n or 802.11b/g/n radio’s MAC address, placement and transmission information. HW Address The Media Access Control (MAC) address of the access point housing the 802.11a/n radio. The MAC address is set at the factory and can be found on the bottom of the access point.
  • Page 322 7-22 AP-7131N-FGR Access Point Product Reference Guide Placement Lists whether the access point radio is indoors or outdoors. To change the placement setting, see Configuring the 802.11a/n or 802.11b/g/n Radio on page 5-59. Current Channel Indicates the channel for communications between the access point radio and its associated MUs.
  • Page 323 Monitoring Statistics 7-23 4. Refer to the RF Status field to view the following MU signal, noise and performance information for the target access point 802.11a/n or 802.11b/g/n radio. Avg MU Signal Displays the average RF signal strength in dBm for all MUs associated with the radio.
  • Page 324: Retry Histogram

    7-24 AP-7131N-FGR Access Point Product Reference Guide 7. Click the Logout button to securely exit the Access Point applet. 7.4.1.1 Retry Histogram Refer to the Retry Histrogram screen for an overview of the retries transmitted by an access point radio and whether those retries contained any data packets. Use this information in combination with the error fields within a Radio Stats screen to assess overall radio performance.
  • Page 325: Viewing Mu Statistics Summary

    Monitoring Statistics 7-25 abundance of retries warrants reconfiguring the access point radio to achieve better performance. 2. Click Apply to save any changes to the Radio Histogram screen. Navigating away from the screen without clicking Apply results in changes to the screens being lost. 3.
  • Page 326 7-26 AP-7131N-FGR Access Point Product Reference Guide 2. Refer to the MU List field to reference associated MU address, throughput and retry information. IP Address Displays the IP address of each of the associated MU. MAC Address Displays the MAC address of each of the associated MU.
  • Page 327: Viewing Mu Details

    7-30 NOTE An echo test initiated from the access point MU Stats Summary screen uses WNMP pings. Therefore, target clients that are not Motorola MUs are unable to respond to the echo test. 5. Click the MU Authentication Statistics button to display a screen with detailed authentication statistics for the an MU.
  • Page 328 Save Protocol mode. In PSP, the MU runs enough power to check for beacons and is otherwise inactive. CAM indicates the MU is continuously aware of all radio traffic. Motorola recommends CAM for those MUs transmitting with the AP frequently and for periods of time of two hours.
  • Page 329 Monitoring Statistics 7-29 Throughput Total column displays the average total packets per second crossing the selected MU. The column displays the average total packets per second received on the MU. The column displays the average total packets per second sent on the MU. The number in black represents throughput for the last 30 seconds, the number in blue represents throughput for the last hour.
  • Page 330: Pinging Individual Mus

    NOTE An echo test initiated from the access point MU Stats Summary screen uses WNMP pings. Therefore, target clients that are not Motorola MUs are unable to respond to the echo test. To ping a specific MU to assess its connection with an access point: 1.
  • Page 331: Mu Authentication Statistics

    Monitoring Statistics 7-31 4. Click the Ping button to begin transmitting ping packets to the station address specified. Refer to the Number of Responses parameter to assess the number of responses from the target MU versus the number of pings transmitted by the access point. Use the ratio of packets sent versus packets received to assess the link quality between MU and the access point Click the...
  • Page 332: Viewing The Mesh Statistics Summary

    7-32 AP-7131N-FGR Access Point Product Reference Guide 7.6 Viewing the Mesh Statistics Summary The access point has the capability of detecting and displaying the properties of other access points in mesh network (either base bridges or client bridges) mode. This information is used to create a list of known wireless bridges.
  • Page 333 Monitoring Statistics 7-33 MAC Address The unique 48-bit, hard-coded Media Access Control address, known as the devices station identifier. This value is hard coded at the factory by the manufacturer and cannot be changed. WLAN Displays the WLAN name each wireless bridge is interoperating with.
  • Page 334: Viewing Known Access Point Statistics

    7.7 Viewing Known Access Point Statistics The access point has the capability of detecting and displaying the properties of other Motorola access points located within its coverage area. Detected access point’s transmit a WNMP message...
  • Page 335 Monitoring Statistics 7-35 indicating their channel, IP address, firmware version, etc. This information is used to create a known AP list. The list has field indicating the properties of the access point discovered. NOTE The Known AP Statistics screen only displays statistics for access points located on the same subnet.
  • Page 336 7-36 AP-7131N-FGR Access Point Product Reference Guide The number MUs associated with the located access point. Unit Name Displays the name assigned to the access point using the System Settings screen. For information on changing the unit name, see Configuring System Settings on page 4-2.
  • Page 337 NOTE A ping test initiated from the access point Known AP Statistics screen uses WNMP pings. Therefore, target devices that are not Motorola access points are unable to respond to the ping test. 5. Click the Send Cfg to APs button to send the your access point’s configuration to other...
  • Page 338 7-38 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 339: Chapter 8. Cli Reference

    CLI Reference The access point Command Line Interface (CLI) is accessed through the serial port or a Telnet session. The access point CLI follows the same conventions as the Web-based user interface. The CLI does, however, provide an “escape sequence” to provide diagnostics for problem identification and resolution.
  • Page 340: Connecting To The Cli

    If this is your first time logging into the access point, you are unable to access any of the access point’s commands until the country code is set. A new password will also need to be created.
  • Page 341: Admin And Common Commands

    8.2 Admin and Common Commands AP7131N>admin> Description: Displays admin configuration options. The items available under this command are shown below. Syntax: help Displays general user interface help. passwd Changes the admin password. summary Shows a system summary. network Goes to the network submenu system Goes to the system submenu.
  • Page 342 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin>help Description: Displays general CLI user interface help. Syntax: help Displays command line help using combinations of function keys for navigation. Example: admin>help : display command help - Eg. ?, show ?, s? * Restriction of “?”: : “?”...
  • Page 343 AP7131N>admin>passwd Description: Changes the password for the admin login. Syntax: passwd Changes the admin password for access point access. This requires typing the old admin password and entering a new password and confirming it. Passwords can be between 8 and11 characters. The access point CLI treats the following as invalid characters: "...
  • Page 344 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin>summary Description: Displays the access point’s system summary. Syntax: summary Displays a summary of high-level characteristics and settings for the WAN, LAN and WLAN. Example: admin>summary AP-7131N-FGR firmware version 4.0.0.0-GDN country code ap mode...
  • Page 345 AP7131N>admin>.. Description: Displays the parent menu of the current menu. This command appears in all of the submenus under admin. In each case, it has the same function, to move up one level in the directory structure. Example: admin(network.lan)>.. admin(network)>...
  • Page 346 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin> / Description: Displays the root menu, that is, the top-level CLI menu. This command appears in all of the submenus under admin. In each case, it has the same function, to move up to the top level in the directory structure.
  • Page 347 AP7131N>admin>save Description: Saves the configuration to system flash. The save command appears in all of the submenus under admin. In each case, it has the same function, to save the current configuration. Syntax: save Saves configuration settings. The save command works at all levels of the CLI. The save command must be issued before leaving the CLI for updated settings to be retained.
  • Page 348 8-10 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin>quit Description: Exits the command line interface session and terminates the session. The quit command appears in all of the submenus under admin. In each case, it has the same function, to exit out of the CLI. Once the quit command is executed, the login prompt displays again.
  • Page 349: Network Commands

    8-11 8.3 Network Commands AP7131N>admin(network)> Description: Displays the network submenu. The items available under this command are shown below. Goes to the LAN submenu. Goes to the WAN submenu. wireless Goes to the Wireless Configuration submenu. firewall Goes to the Firewall submenu. router Goes to the Router submenu.
  • Page 350: Network Lan Commands

    8-12 AP-7131N-FGR Access Point Product Reference Guide 8.3.1 Network LAN Commands AP7131N>admin(network.lan)> Description: Displays the LAN submenu. The items available under this command are shown below. show Shows current access point LAN parameters. Sets LAN parameters. bridge Goes to the mesh configuration submenu.
  • Page 351 8-13 AP7131N>admin(network.lan)> show Description: Displays the access point LAN settings. Syntax: show Shows the settings for the access point LAN1 and LAN2 interfaces. Example: admin(network.lan)>show Warning: This will display secure information, Do you want to continue? (n/y?)y LAN On Ethernet Port : LAN1 LAN Ethernet Timeout : disable...
  • Page 352 8-14 AP-7131N-FGR Access Point Product Reference Guide LAN IP mode : DHCP server IP Address : 192.168.1.1 Network Mask : 255.255.255.255 Default Gateway : 192.168.1.1 Domain Name Primary DNS Server : 192.168.0.2 Secondary DNS Server : 192.168.0.3 WINS Server : 192.168.0.255 admin(network.lan)>...
  • Page 353 8-15 AP7131N>admin(network.lan)> set Description: Sets the LAN parameters for the LAN port. Syntax: <mode> Enables or disables the access point LAN interface. name <idx-name > Defines the LAN name by index. ethernet-port-lan <idx> Defines which LAN (LAN1 or LAN2) is active on the Ethernet port. timeout <seconds>...
  • Page 354: Network Lan, Bridge Commands

    8-16 AP-7131N-FGR Access Point Product Reference Guide 8.3.1.1 Network LAN, Bridge Commands AP7131N>admin(network.lan.bridge)> Description: Displays the access point Bridge submenu. show Displays the mesh configuration parameters for the access point’s LANs. Sets the mesh configuration parameters for the access point’s LANs..
  • Page 355 8-17 AP7131N>admin(network.lan.bridge)> show Description: Displays the mesh bridge configuration parameters for the access point’s LANs. Syntax: show Displays mesh bridge configuration parameters for the access point’s LANs. Example: admin(network.lan.bridge)>show ** LAN1 Bridge Configuration ** Bridge Priority :63335 Hello Time (seconds) Message Age Time (seconds) Forward Delay Time (seconds) :15 Entry Ageout Time (seconds)
  • Page 356 8-18 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.bridge)> set Description: Sets the mesh configuration parameters for the access point’s LANs. Syntax: set priority <LAN-idx> <seconds> Sets bridge priority time in seconds (0-65535) for specified LAN. hello <LAN-idx> <seconds> Sets bridge hello time in seconds (0-10) for specified LAN.
  • Page 357: Network Lan, Wlan-Mapping Commands

    8-19 8.3.1.2 Network LAN, WLAN-Mapping Commands AP7131N>admin(network.lan.wlan-mapping)> Description: Displays the WLAN/Lan/Vlan Mapping submenu. show Displays the VLAN list currently defined for the access point. Sets the access point VLAN configuration. create Creates a new access point VLAN. edit Edits the properties of an existing access point VLAN. delete Deletes a VLAN.
  • Page 358 8-20 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.wlan-mapping)> show Description: Displays the VLAN list currently defined for the access point.. These parameters are defined with the set command. Syntax: show name Displays the existing list of VLAN names. vlan-cfg Shows WLAN-VLAN mapping and VLAN configuration.
  • Page 359 8-21 admin(network.lan.wlan-mapping)>show wlan Warning: This will display secure information, Do you want to continue? (n/y?)y WLAN1: WLAN Name :WLAN1 ESSID :101 Radio Bands :2.4 and 5.0 GHz VLAN Security Policy :Default QoS Policy :Default Rate Limiting :disabled For information on displaying the VLAN screens using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 360 8-22 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.wlan-mapping)> set Description: Sets VLAN parameters for the access point. Syntax: set mgmt- tag <id> Defines the Management VLAN tag index (1 or 2) to tag number (1-4095). native-tag <id> Sets the Native VLAN tag index (1 or 2) to tag number (1-4095).
  • Page 361 8-23 AP7131N>admin(network.lan.wlan-mapping)> create Description: Creates a VLAN for the access point. Syntax: create vlan-id <id> Defines the VLAN ID (1-4095). vlan-name <name> Specifies the name of the VLAN (1-31 characters in length). Example: admin(network.lan.wlan-mapping)> admin(network.lan.wlan-mapping)>create 5 vlan-5 For information on creating VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 362 8-24 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.wlan-mapping)> edit Description: Modifies a VLAN’s name and ID. Syntax: edit name <name> Modifies an exisiting VLAN name (1-31 characters in length) <id> Modifies an existing VLAN ID (1-4095) characters in length) For information on editing VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 363 8-25 AP7131N>admin(network.lan.wlan-mapping)> delete Description: Deletes a specific VLAN or all VLANs. Syntax: delete < VLAN id> Deletes a specific VLAN ID (1-16). Deletes all defined VLAN entries. For information on deleting VLANs using the applet (GUI), see Configuring VLAN Support on page 5-5.
  • Page 364 8-26 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.wlan-mapping)> lan-map Description: Maps an access point VLAN to a WLAN. Syntax: lan-map <wlan name> Maps an existing WLAN to an enabled LAN. All names and IDs are case-sensitive. <lan name> Defines enabled LAN name. All names and IDs are case-sensitive.
  • Page 365 8-27 AP7131N>admin(network.lan.wlan-mapping)> vlan-map Description: Maps an access point VLAN to a WLAN. Syntax: vlan-map <wlan name> Maps an existing WLAN to an enabled LAN. All names and IDs are case-sensitive. <vlan name> Defines the existing VLAN name. All names and IDs are case-sensitive. admin(network.lan.wlan-mapping)>vlan-map wlan1 vlan1 For information on mapping VLANs using the applet (GUI), see Configuring VLAN Support on page...
  • Page 366: Network Lan, Dhcp Commands

    8-28 AP-7131N-FGR Access Point Product Reference Guide 8.3.1.3 Network LAN, DHCP Commands AP7131N>admin(network.lan.dhcp)> Description: Displays the access point DHCP submenu. The items available are displayed below. show Displays DHCP parameters. Sets DHCP parameters. Adds static DHCP address assignments. delete Deletes static DHCP address assignments.
  • Page 367 8-29 AP7131N>admin(network.lan.dhcp)> show Description: Shows DHCP parameter settings. Syntax: show Displays DHCP parameter settings for the access point. These parameters are defined with the set command. Example: admin(network.lan.dhcp)>show **LAN1 DHCP Information** DHCP Address Assignment Range: Starting IP Address : 192.168.0.100 Ending IP Address : 192.168.0.254 Lease Time...
  • Page 368 8-30 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.dhcp)> set Description: Sets DHCP parameters for the LAN port. Syntax: set range <LAN-idx> <ip1> <ip2> Sets the DHCP assignment range from IP address <ip1> to IP address <ip2> for the specified LAN (1-lan1, 2-lan2).
  • Page 369 8-31 AP7131N>admin(network.lan.dhcp)> add Description: Adds static DHCP address assignments. Syntax: <LAN-idx> <mac> <ip> Adds a reserved static IP address to a MAC address for the specified LAN Example: admin(network.lan.dhcp)>add 1 00A0F8112233 192.160.24.6 admin(network.lan.dhcp)>add 1 00A0F1112234 192.169.24.7 admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index MAC Address IP Address -----------------------------------------------------------------------------...
  • Page 370 8-32 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.dhcp)> delete Description: Deletes static DHCP address assignments. Syntax: delete <LAN-idx> <entry> Deletes the static DHCP address entry (1-30) for the specified LAN. <LAN-idx> Deletes all static DHCP addresses. Example: admin(network.lan.dhcp)>list 1 -----------------------------------------------------------------------------...
  • Page 371 8-33 AP7131N>admin(network.lan.dhcp)> list Description: Lists static DHCP address assignments. Syntax: list <LAN-idx> <cr> Lists the static DHCP address assignments for the specified LAN (1-LAN1, 2 LAN2). Example: admin(network.lan.dhcp)>list 1 ----------------------------------------------------------------------------- Index MAC Address IP Address ----------------------------------------------------------------------------- 00A0F8112233 10.1.2.4 00A0F8102030 10.10.1.2 00A0F8112234 10.1.2.3 00A0F8112235...
  • Page 372: Network Type Filter Commands

    8-34 AP-7131N-FGR Access Point Product Reference Guide 8.3.1.4 Network Type Filter Commands AP7131N>admin(network.lan.type-filter)> Description: Displays the access point Type Filter submenu. The items available under this command include: show Displays the current Ethernet Type exception list. Defines Ethernet Type Filter parameters.
  • Page 373 8-35 AP7131N>admin(network.lan.type-filter)> show Description: Displays the access point’s current Ethernet Type Filter configuration. Syntax: show <LAN-idx> Displays the existing Type-Filter configuration for the specified LAN. Example: admin(network.lan.type-filter)>show 1 Ethernet Type Filter mode : allow ----------------------------------------------------------------------------- index ethernet type ----------------------------------------------------------------------------- 8137 For information on displaying the type filter configuration using the applet, see Setting the Type Filter Configuration on page 5-15.
  • Page 374 8-36 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.type-filter)> set Description: Defines the access point Ethernet Type Filter configuration. Syntax: set mode <LAN-idx> <mode> Allows or denies the access point from processing a specified Ethernet data type for the specified LAN.
  • Page 375 8-37 AP7131N>admin(network.lan.type-filter)> add Description: Adds an Ethernet Type Filter entry. Syntax: <LAN-idx> <type> Adds entered Ethernet Type to list of data types either allowed or denied access point processing permissions for the specified LAN (either LAN1 or LAN2). Example: admin(network.lan.type-filter)> admin(network.wireless.type-filter)>add 1 8137 admin(network.wireless.type-filter)>add 2 0806 admin(network.wireless.type-filter)>show 1...
  • Page 376 8-38 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.lan.type-filter)> delete Description: Removes an Ethernet Type Filter entry individually or the entire Type Filter list. Syntax: delete <LAN-idx> <index> Deletes the specified Ethernet Type index entry (1 through 16). <LAN-idx> Deletes all Ethernet entries currently in list.
  • Page 377: Network Wan Commands

    8-39 8.3.2 Network WAN Commands AP7131N>admin(network.wan)> Description: Displays the WAN submenu. The items available under this command are shown below. show Displays the access point WAN configuration and the access point’s current PPPoE configuration. Defines the access point’s WAN and PPPoE configuration. Displays the NAT submenu, wherein Network Address Translations (NAT) can be defined.
  • Page 378 8-40 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan)> show Description: Displays the access point WAN port parameters. Syntax: show Shows the general IP parameters for the WAN port along with settings for the WAN interface. Example: admin(network.wan)>show Warning: This will display secure information,...
  • Page 379 8-41 AP7131N>admin(network.wan)> set Description: Defines the configuration of the access point WAN port. Syntax: set wan enable/disable Enables or disables the access point WAN port. dhcp enable/disable Enables or disables WAN DHCP Client mode. ipadr <idx> <a.b.c.d> Sets up to 8 (using <indx> from to 8) IP addresses <a.b.c.d>...
  • Page 380: Network Wan Nat Commands

    8-42 AP-7131N-FGR Access Point Product Reference Guide 8.3.2.1 Network WAN NAT Commands AP7131N>admin(network.wan.nat)> Description: Displays the NAT submenu. The items available under this command are shown below. show Displays the access point’s current NAT parameters for the specified index. Defines the access point NAT settings.
  • Page 381 8-43 AP7131N>admin(network.wan.nat)> show Description: Displays access point NAT parameters. Syntax: show <idx> <cr> Displays access point NAT parameters for the specified NAT index (1-8). Example: admin(network.wan.nat)>show 2 WAN IP Mode : enable WAN IP Address : 157.235.91.2 NAT Type : 1-to-many Inbound Mappings : Port Forwarding unspecified port forwarding mode...
  • Page 382 8-44 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.nat)> set Description: Sets NAT inbound and outbound parameters. Syntax: set type <index> <type> Sets the type of NAT translation for WAN address index <idx> (1-8) to <type> (none, 1-to-1, or 1-to-many). <index>...
  • Page 383 8-45 AP7131N>admin(network.wan.nat)> add Description: Adds NAT entries. Syntax: <idx> <name> <tran> <port1> <port2> <ip> <dst_port> Sets an inbound network address translation (NAT) for WAN address <idx>, where <name> is the name of the entry (1 to 7 characters), <tran> is the transport protocol (one of tcp, udp, icmp, ah, esp, gre, or all), <port1> is the starting port number in a port range, <port2>...
  • Page 384 8-46 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.nat)> delete Description: Deletes NAT entries. Syntax: delete <idx> <entry> Deletes a specified NAT index entry <entry> associated with the WAN. <idx> Deletes all NAT entries associated with the WAN. Example: admin(network.wan.nat)>list 1...
  • Page 385 8-47 AP7131N>admin(network.wan.nat)> list Description: Lists access point NAT entries for the specified index. Syntax: list <idx> Lists the inbound NAT entries associated with the WAN index (1-8). Example: admin(network.wan.nat)>list 1 ----------------------------------------------------------------------------- index name Transport start port end port internal ip translation ----------------------------------------------------------------------------- special tcp...
  • Page 386: Network Wan, Vpn Commands

    8-48 AP-7131N-FGR Access Point Product Reference Guide 8.3.2.2 Network WAN, VPN Commands AP7131N>admin(network.wan.vpn)> Description: Displays the VPN submenu. The items available under this command include: Adds VPN tunnel entries. Sets key exchange parameters. delete Deletes VPN tunnel entries. list Lists VPN tunnel entries reset Resets all VPN tunnels.
  • Page 387 8-49 AP7131N>admin(network.wan.vpn)> add Description: Adds a VPN tunnel entry. Syntax: <name> <idx> <LWanIP> <RSubnetIP> <RSubnetMask> <RGatewayIP> Creates a tunnel <name> (1 to 13 characters) to gain access through local WAN IP <LWanIP> from the remote subnet with address <RSubnetIP> and subnet mask <RSubnetMask> using the remote gateway <RGatewayIP>. Example: admin(network.wan.vpn)>add 2 SJSharkey 209.235.44.31 206.107.22.46 255.255.255.224 206.107.22.1...
  • Page 388 8-50 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.vpn)> set Description: Sets VPN entry parameters. Syntax: set type <name> <tunnel type> Sets the tunnel type <name> to Auto Manual for the specified tunnel name. authalgo <name> <authalgo> Sets the authentication algorithm for <name> to (None, MD5, or SHA1).
  • Page 389 8-51 salife <name> <lifetime> Defines the name of the tunnnel <name> the Security Association Life Time <300-65535> applies to in seconds. opmode <name> <opmode> Sets the Operation Mode of IKE for <name> to Main or Aggr(essive). myidtype <name> <idtype> Sets the Local ID type for IKE authentication for <name>...
  • Page 390 8-52 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.vpn)> delete Description: Deletes VPN tunnel entries. Syntax: delete Deletes all VPN entries. <name> Deletes VPN entries <name>. Example: admin(network.wan.vpn)>list -------------------------------------------------------------------------- Tunnel Name Type Remote IP/Mask Remote Gateway Local WAN IP -------------------------------------------------------------------------- Eng2EngAnnex Manual 192.168.32.2/24...
  • Page 391 8-53 AP7131N>admin(network.wan.vpn)> list Description: Lists VPN tunnel entries. Syntax: list <cr> Lists all tunnel entries. <name> Lists detailed information about tunnel named <name>. The <name> must match case with the name of the VPN tunnel entry. Example: admin(network.wan.vpn)>list Warning: This will display secure information, Do you want to continue? (n/y?)y -------------------------------------------------------------------------- Tunnel Name...
  • Page 392 8-54 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.vpn)> reset Description: Resets all of the access point’s VPN tunnels. Syntax: reset Resets all VPN tunnel states. Example: admin(network.wan.vpn)>reset VPN tunnels reset. admin(network.wan.vpn)> For information on configuring VPN using the applet (GUI), see Configuring VPN Tunnels on page 6-23.
  • Page 393 8-55 AP7131N>admin(network.wan.vpn)> stats Description: Lists statistics for all active tunnels. Syntax: stats Display statistics for all VPN tunnels. Example: admin(network.wan.vpn)>stats ----------------------------------------------------------------------------- Tunnel Name Status SPI(OUT/IN) Life Time Bytes(Tx/Rx) ----------------------------------------------------------------------------- Eng2EngAnnex Not Active SJSharkey Not Active For information on displaying VPN information using the applet (GUI), see Viewing VPN Status on page 6-39.
  • Page 394 8-56 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.vpn)> ikestate Description: Displays statistics for all active tunnels using Internet Key Exchange (IKE). Syntax: ikestate Displays status about Internet Key Exchange (IKE) for all tunnels. In particular, the table indicates whether IKE is connected for any of the tunnels, it provides the destination IP address, and the remaining lifetime of the IKE key.
  • Page 395: Ap7131N>Admin(Network.wan.content)

    8-57 8.3.2.3 AP7131N>admin(network.wan.content)> Description: Displays the Outbound Content Filtering menu. The items available under this command include: addcmd Adds control commands to block outbound traffic. delcmd Deletes control commands to block outbound traffic. list Lists application control commands. Goes to the parent menu. Goes to the root menu.
  • Page 396 8-58 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.content)> addcmd Description: Adds control commands to block outbound traffic. Syntax: addcmd Adds WEB commands to block outbound traffic. proxy Adds a Web proxy command. activex Adds activex files. file Adds Web URL extensions (10 files maximum) smtp Adds SMTP commands to block outbound traffic.
  • Page 397 8-59 AP7131N>admin(network.wan.content)> delcmd Description: Deletes control commands to block outbound traffic. Syntax: delcmd Deletes WEB commands to block outbound traffic. proxy Deletes a Web proxy command. activex Deletes activex files. file Deletes Web URL extensions (10 files maximum) smtp Deletes SMTP commands to block outbound traffic. helo helo command mail...
  • Page 398 8-60 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.content)> list Description: Lists application control commands. Syntax: list Lists WEB application control record. smtp Lists SMTP application control record. Lists FTP application control record. Example: admin(network.wan.content)>list web HTTP Files/Commands Web Proxy : deny...
  • Page 399: Network Wan, Dynamic Dns Commands

    8-61 8.3.2.4 Network WAN, Dynamic DNS Commands AP7131N>admin(network.wan.dyndns)> Description: Displays the Dynamic DNS submenu. The items available under this command include: Sets Dynamic DNS parameters. update Sets key exchange parameters. show Shows the Dynamic DNS configuration. Goes to the parent menu. Goes to the root menu.
  • Page 400 8-62 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.dyndns)> set Description: Sets the access point’s Dynamic DNS configuration. Syntax: mode enable/disable Enables or disbales the Dynamic DNS service for the access point. username <name> Enter a 1 - 32 character username for the account used for the access point.
  • Page 401 8-63 AP7131N>admin(network.wan.dyndns)> update Description: Updates the access point’s current WAN IP address with the DynDNS service. Syntax: update Updates the access point’s current WAN IP address with the DynDNS service. Example: admin(network.wan.dyndns)>update IP Address : 157.235.91.231 Hostname : greengiant For an overview of the Dynamic DNS options available using the applet (GUI), see Configuring Dynamic DNS on page 5-27.
  • Page 402 8-64 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wan.dyndns)> show Description: Shows the current Dynamic DNS configuration. Syntax: show Shows the access point’s current Dynamic DNS configuration. Example: admin(network.wan.dyndns)>show Warning: This will display secure information, Do you want to continue? (n/y?)y...
  • Page 403: Network Wireless Commands

    8-65 8.3.3 Network Wireless Commands AP7131N>admin(network.wireless) Description: Displays the access point wireless submenu. The items available under this command include: wlan Displays the WLAN submenu used to create and configure up to 16 WLANs per access point. security Displays the security submenu used to create encryption and authentication based security policies for use with access point WLANs.
  • Page 404: Network Wlan Commands

    8-66 AP-7131N-FGR Access Point Product Reference Guide 8.3.3.1 Network WLAN Commands AP7131N>admin(network.wireless.wlan)> Description: Displays the access point wireless LAN (WLAN) submenu. The items available under this command include: show Displays the access point’s current WLAN configuration. create Defines the parameters of a new WLAN.
  • Page 405 8-67 AP7131N>admin(network.wireless.wlan)> show Description: Displays the access point’s current WLAN configuration. Syntax: show summary Displays the current configuration for existing WLANs. wlan <number> Displays the configuration for the requested WLAN (WLAN 1 through 16). Example: admin(network.wireless.wlan)>show summary Warning: This will display secure information, Do you want to continue? (n/y?)y WLAN1 WLAN Name...
  • Page 406 8-68 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wlan)> create Description: Defines the parameters of a new WLAN. Syntax: create show wlan <number> Displays newly created WLAN and policy number. <essid> Defines the ESSID for a target WLAN. <name> Determines the name of this particlular WLAN (1-32).
  • Page 407 8-69 answer Broadcast ESSID : disable QoS Policy : Default per-mu rate limiting : disabled per-mu rate limit (wired-to-wl) : 1000 kb per-mu rate limit (wl-to-wired) : 1000 kb admin(network.wireless.wlan.create)>show security ---------------------------------------------------------------------- Secu Policy Name Authen Encryption Associated WLANs ---------------------------------------------------------------------- 1 Default Manual WPA2/CCMP...
  • Page 408 8-70 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wlan)> edit Description: Edits the properties of an existing WLAN policy. Syntax: edit <index> Edits the properties of an existing (and specified) WLAN policy (1 -16). show Displays the WLANs pamaters and summary.
  • Page 409 8-71 AP7131N>admin(network.wireless.wlan)> delete Description: Deletes an existing WLAN. Syntax: delete <wlan-name> Deletes a target WLAN using the name supplied. Deletes all WLANs defined (except default WLAN). For information on deleting a WLAN using the applet (GUI), see Creating/Editing Individual WLANs on page 5-32.
  • Page 410 8-72 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wlan.hotspot)> Description: Displays the Hotspot submenu. The items available under this command include: show Show hotspot parameters. redirection Goes to the hotspot redirection menu. radius Goes to the hotspot Radius menu. white-list Goes to the hotspot white-list menu.
  • Page 411 8-73 AP7131N>admin(network.wireless.wlan.hotspot)> show Description: Displays the current access point Rogue AP detection configuration. Syntax: show hotspot <idx> Shows hotspot parameters per wlan index (1-16). Example: admin(network.wireless.wlan.hotspot)>show hotspot 1 Warning: This will display secure information, Do you want to continue? (n/y?)y WLAN1 Hotspot Mode : enable...
  • Page 412 8-74 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wlan.hotspot)> redirection Description: Goes to the hotspot redirection menu. Syntax: redirection set <page-loc> Sets the hotspot http-re-direction by index (1-16) for the specified URL. <exturl> Shows hotspot http-redirection details for specifiec index (1-16) for specified page (login, welcome, fail) and target URL..
  • Page 413 8-75 AP7131N>admin(network.wireless.wlan.hotspot)> radius Description: Goes to the hotspot Radius menu. Syntax: Sets the Radius hotspot configuration. show Shows Radius hotspot server details. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring the Hotspot options available to the access point using the applet (GUI), see Configuring WLAN Hotspot Support on page...
  • Page 414 8-76 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wlan.hotspot.radius)> set Description: Sets the Radius hotspot configuration. Syntax: server <idx> <srvr_type> <ipadr> Sets the Radius hotpost server IP address per wlan index (1-16) port <idx> <srvr_type> <port> Sets the Radius hotpost server port per wlan index (1-16) secret <idx>...
  • Page 415 8-77 AP7131N>admin(network.wireless.wlan.hotspot.radius)> show Description: Shows Radius hotspot server details. Syntax: show radius <idx> Displays Radius hotspot server details per index (1-16) Example: admin(network.wireless.wlan.hotspot.radius)>show radius 1 Warning: This will display secure information, Do you want to continue? (n/y?)y WLAN 1 Hotspot Mode : enable Primary Server Ip adr : 157.235.12.12...
  • Page 416 8-78 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wlan.hotspot)> white-list Description: Goes to the hotspot white-list menu. Syntax: white-list add <rule> Adds hotspot whitelist rules by index (1-16) for specified IP address. clear Clears hotspot whitelist rules for specified index (1-16).
  • Page 417: Network Security Commands

    8-79 8.3.3.2 Network Security Commands AP7131N>admin(network.wireless.security)> Description: Displays the access point wireless security submenu. The items available under this command include: show Displays the access point’s current security configuration. create Creates a security policy. edit Edits the properties of an existing security policy. delete Removes a specific security policy.
  • Page 418 8-80 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.security)>show Description: Displays the access point’s current security configuration. Syntax: show summary Displays list of existing security policies (1-16). policy <id> Displays the specified security policy <id>. Example: admin(network.wireless.security)>show summary Warning: This will display secure information,...
  • Page 419 (1-63 characters) for server <sidx> (1-primary or 2- secondary). The default password is now “motorola” instead of “symbol.” Be cognizant of this when importing a configuration from the 1.1 baseline, as this shared secret will have to be changed to motorola (after the import) to avoid MU authentication failures.
  • Page 420 8-82 AP-7131N-FGR Access Point Product Reference Guide retry <number> Sets the maximum number of MU retries to <retry> (1-10). syslog <mode> Enable or disable syslog messages. <ip> Defines syslog server IP address. mu-quiet <time> Set the EAP MU/supplicant quiet period to <time>...
  • Page 421 CAUTION If importing a 1.1 (or earlier) baseline configuration, the 802.1x EAP Radius shared secret password will remain “symbol,” instead of “motorola” (as now required). If the shared secret password is not changed to “motorola” there will be a shared secret mis-match, resulting in MU authentication failures.
  • Page 422 8-84 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.security.edit)> Description: Edits the properties of a specific security policy. Syntax: show Displays the new or modified security policy parameters. <index> Edits security policy parameters. The values subject to modification, are the same ones created using the AP7131N>admin(network.wireless.security)>create...
  • Page 423 8-85 AP7131N>admin(network.wireless.security)> delete Description: Deletes a specific security policy. Syntax: delete <sec-name> Removes the specified security policy from the list of supported policies. <all> Removes all security policies except the default policy. For information on configuring the encryption and authentication options available to the access point using the applet (GUI), see Configuring Security Options on page 6-2.
  • Page 424: Network Acl Commands

    8-86 AP-7131N-FGR Access Point Product Reference Guide 8.3.3.3 Network ACL Commands AP7131N>admin(network.wireless.acl)> Description: Displays the access point Mobile Unit Access Control List (ACL) submenu. The items available under this command include: show Displays the access point’s current ACL configuration. create Creates an MU ACL policy.
  • Page 425 8-87 AP7131N>admin(network.wireless.acl)> show Description: Displays the access point’s current ACL configuration. Syntax: show summary Displays the list of existing MU ACL policies. policy <index> Displays the requested MU ACL index policy. Example: admin(network.wireless.acl)>show summary ---------------------------------------------------------------------- ACL Policy Name Associated WLANs ---------------------------------------------------------------------- 1 Default Front Lobby, WLAN1...
  • Page 426 8-88 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.acl)> create Description: Creates an MU ACL policy. Syntax: create show <acl-name> Displays the parameters of a new ACL policy. acl-name <index> Sets the MU ACL policy name. mode <acl-mode> Sets the ACL mode for the defined index (1-16). Allowed MUs can access the access point managed LAN.
  • Page 427 8-89 AP7131N>admin(network.wireless.acl.edit)> Description: Edits the properties of an existing MU ACL policy. Syntax: show Displays MU ACL policy and its parameters. Modifies the properties of an existing MU ACL policy. add-addr Adds an MU ACL table entry. delete Deletes an MU ACL table entry, including starting and ending MAC address ranges. change Completes the changes made and exits the session.
  • Page 428 8-90 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.acl)> delete Description: Removes an MU ACL policy. Syntax: delete <idx> Deletes a partilcular MU ACL policy index. Deletes all MU ACL policies. For information on configuring the ACL options available to the access point using the applet (GUI), see...
  • Page 429: Network Radio Configuration Commands

    8-91 8.3.3.4 Network Radio Configuration Commands AP7131N>admin(network.wireless.radio)> Description: Displays the access point Radio submenu. The items available under this command include: show Summarizes access point radio parameters at a high-level. Defines the access point radio configuration. radio1 Displays the 2.4 GHz radio submenu. radio2 Displays the 5.0 GHz radio submenu.
  • Page 430 8-92 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio)> show Description: Displays the access point’s current radio configuration. Syntax: show Displays the access point’s current radio configuration. Example: admin(network.wireless.radio)>show Radio Configuration Radio 1 Name : Radio 1 Radio Mode : enable...
  • Page 431 8-93 AP7131N>admin(network.wireless.radio)> set Description: Sets the access point’s radio configuration and defines the RF band of operation. Syntax: set radio-config <mode> Sets the radio configuration. max-mus <mus>> Defines the maximum number of MUs assigned to the specified radio (idx 1 or 2). The range can be defined between 0 and 127.
  • Page 432 8-94 AP-7131N-FGR Access Point Product Reference Guide Two Radio SKU set radio-config <value 1-7> Radio 1 WLAN, Radio 2 WIPS Radio 1 WIPS, Radio 2 WLAN Radio 1 WLAN, Radio 2 WLAN Radio 1 WIPS, Radio 2 WIPS Radio 1 WLAN, Radio 2 Disabled...
  • Page 433 8-95 AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz])> Description: Displays a specific 802.11n 2.4 GHz radio 1 submenu. The items available under this command include: Syntax: show Displays 802.11n (2.4 GHz) radio settings. Defines specific 802.11n (2.4 GHz) radio parameters. advanced Displays the Adavanced radio settings submenu. mesh Goes to the Wireless AP Connections submenu.
  • Page 434 8-96 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz])>show Description: Displays specific 802.11n (2.4 GHz) radio settings. Syntax: show radio Displays specific 802.11n (2.4 GHz) radio settings. rates Displays specific 802.11n (2.4 GHz) radio rate settings. aggr Displays specific 802.11n (2.4 GHz) aggregation settings.
  • Page 435 8-97 admin(network.wireless.radio.802-11n[2.4 GHz])>show rates Basic Rates 1 2 5.5 11 Supported Rates 1 2 5.5 6 9 11 12 18 24 36 48 54 Short Guard Interval disable ----------------------------------------------------------------------------- MCS Index Basic/Supported 20 MHz Rate 40 MHz Rate ----------------------------------------------------------------------------- Supported 6.5 Mbps 13.5 Mbps Supported...
  • Page 436 8-98 AP-7131N-FGR Access Point Product Reference Guide admin(network.wireless.radio.802-11n[2.4 GHz])>show qos Radio QOS Parameter Set 11n-default ----------------------------------------------------------------------------- Access Category CWMin CWMax AIFSN TXOPs (32 usec) TXOPs ms ----------------------------------------------------------------------------- Background 1023 0.000 Best Effort 0.992 Video 3.008 Voice 1.504 CAUTION If you do NOT include the index number (for example, "set dtim 50"), the DTIMs for all four BSSIDs will be changed to 50.
  • Page 437 8-99 AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz])> set Description: Defines specific 802.11n (2.4 GHz) radio parameters. Syntax: set placement Defines the access point radio placement as indoors or outdoors. ch-mode Determines how the radio channel is selected (user, auto-20 or auto-40). channel Defines the radio channel used. Channel allowed depends on actual country of operation. power Defines the antenna power transmit level.
  • Page 438 8-100 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].advanced)> Description: Displays the advanced submenu for the 802.11n (2.4 GHz) radio. The items available under this command include: Syntax: show Displays advanced radio settings for the 802.11n (2.4 GHz) radio. Defines advanced parameters for the 802.11n (2.4 GHz) radio.
  • Page 439 8-101 AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].advanced)> show Description: Displays the BSSID to WLAN mapping for the 802.11n (2.4 GHz) radio. Syntax: show advanced Displays advanced settings for the 802.11n (2.4 GHz) radio. wlan Displays WLAN summary list for the 802.11n (2.4 GHz) radio. Example: admin(network.wireless.radio.802-11n[2.4 GHz].advanced)>show advanced...
  • Page 440 8-102 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].advanced)> set Description: Defines advanced parameters for the target 802.11n (2.4 GHz) radio. Syntax: <wlan-name> <bssid> set wlan Defines advanced WLAN to BSSID mapping for the target radio. <bss-id> <wlan name> Sets the BSSID to primary WLAN definition.
  • Page 441 8-103 AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].mesh)> Description: Displays the mesh configuration submenu for the 802.11n (2.4 GHz) radio. The items available under this command include: Syntax: show Displays mesh settings and status for the 802.11n (2.4 GHz) radio. Defines mesh parameters for the 802.11n (2.4 GHz) radio. Adds a 802.11n (2.4 GHz) radio mesh connection.
  • Page 442 8-104 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].mesh)> show Description: Displays mesh settings and status for the 802.11n (2.4 GHz) radio. Syntax: show config Displays the connection list configuration. status Shows the available mesh connection status. Example: admin(network.wireless.radio.802-11n[2.4 GHz].mesh)>show config...
  • Page 443 8-105 AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].mesh)> set Description: Defines mesh parameters for the 802.11n (2.4 GHz) radio. Syntax: <auto-select> Enables or disables auto select mesh connections. Example: admin(network.wireless.radio.802-11n[2.4 GHz].mesh)>set auto-select enable admin(network.wireless.radio.802-11n[2.4 GHz].mesh)>show config Mesh Connection Auto Select : enable...
  • Page 444 8-106 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].mesh)> add Description: Adds a 802.11n (2.4 GHz) radio mesh connection. Syntax: <priority> Defines the connection priority (1-16). <mac> Sets the access point MAC address. Example: admin(network.wireless.radio.802-11n[2.4 GHz].mesh)>add 2 AA21DCDD12DE...
  • Page 445 8-107 AP7131N>admin(network.wireless.radio.802-11n[2.4 GHz].mesh)> delete Description: Deletes a 802.11n (2.4 GHz) radio mesh connection by specified index or by removing all entries. Syntax: delete <idx> Deletes a mesh connection by specified index (1-16). <all> Removes all mesh connections. Example: admin(network.wireless.radio.802-11n[2.4 GHz].mesh)>delete 2...
  • Page 446 8-108 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz])> Description: Displays a specific 802.11n (5.0 GHz) radio 2 submenu. The items available under this command include: Syntax: show Displays 802.11n (5.0 GHz) radio settings Defines specific 802.11n (5.0 GHz) radio parameters.
  • Page 447 8-109 AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz])> show Description: Displays specific 802.11n (5.0 GHz) radio settings. Syntax: show radio Displays specific 802.11n (5.0 GHz) radio settings. rates Displays specific 802.11n (5.0 GHz) radio rate settings. aggr Displays specific 802.11n (5.0 GHz) aggregation settings. Displays specific 802.11n (5.0 GHz) radio WMM QoS settings. Example: admin(network.wireless.radio.802-11n[5.0 GHz])>show radio...
  • Page 448 8-110 AP-7131N-FGR Access Point Product Reference Guide admin(network.wireless.radio.802-11n[5.0 GHz])>show rates Basic Rates 6 12 24 Supported Rates 6 9 12 18 24 36 48 54 Short Guard Interval disable ----------------------------------------------------------------------------- MCS Index Basic/Supported 20 MHz Rate 40 MHz Rate ----------------------------------------------------------------------------- Supported 6.5 Mbps...
  • Page 449 8-111 admin(network.wireless.radio.802-11n[5.0 GHz])>show qos Radio QOS Parameter Set 11n-default ----------------------------------------------------------------------------- Access Category CWMin CWMax AIFSN TXOPs (32 usec) TXOPs ms ----------------------------------------------------------------------------- Background 1023 0.000 Best Effort 0.992 Video 3.008 Voice 1.504 For information on configuring the Radio 2 Configuration options available to the access point using the applet (GUI), see Configuring a WLAN Access Control List (ACL) on page 5-38.
  • Page 450 8-112 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz])> set Description: Defines specific 802.11n (5.0 GHz) radio parameters. Syntax: set placement Defines the access point radio placement as indoors or outdoors. ch-mode Determines how the radio channel is selected. channel Defines the actual channel used by the radio.
  • Page 451 8-113 AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].advanced)> Description: Displays the advanced submenu for the 802.11n (5.0 GHz) radio. The items available under this command include: Syntax: show Displays advanced radio settings for the 802.11n (5.0 GHz) radio. Defines advanced parameters for the 802.11n (5.0 GHz) radio. Goes to the parent menu.
  • Page 452 8-114 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].advanced)> show Description: Displays the BSSID to WLAN mapping for the 802.11n (5.0 GHz) radio. Syntax: show advanced Displays advanced settings for the 802.11n (5.0 GHz) radio. wlan Displays WLAN summary list for 802.11n (5.0 GHz) radio.
  • Page 453 8-115 AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].advanced)> set Description: Defines advanced parameters for the target 802.11n (5.0 GHz) radio. Syntax: <wlan-name> <bssid> set wlan Defines advanced WLAN to BSSID mapping for the target 5.0 GHz radio. <bss-id> <wlan name> Sets the BSSID to primary WLAN definition. Example: admin(network.wireless.radio.802-11n[5.0 GHz].advanced)>set wlan demoroom 1...
  • Page 454 8-116 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].mesh)> Description: Displays the mesh configuration submenu for the 802.11n (5.0 GHz) radio. The items available under this command include: Syntax: show Displays mesh settings and status for the 802.11n (5.0 GHz) radio.
  • Page 455 8-117 AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].mesh)> show Description: Displays mesh settings and status for the 802.11n (5.0 GHz) radio. Syntax: show config Displays the connection list configuration. status Shows the available mesh connection status. Example: admin(network.wireless.radio.802-11n[5.0 GHz].mesh)>show config Mesh Connection Auto Select : enable admin(network.wireless.radio.802-11n[5.0 GHz].mesh)>show status -----------------------------------------------------------------------------...
  • Page 456 8-118 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].mesh)> set Description: Defines mesh parameters for the 802.11n (5.0 GHz) radio. Syntax: <auto-select> Enables or disables auto select mesh connections. Example: admin(network.wireless.radio.802-11n[5.0 GHz].mesh)>set auto-select enable admin(network.wireless.radio.802-11n[5.0 GHz].mesh)>show config Mesh Connection Auto Select...
  • Page 457 8-119 AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].mesh)> add Description: Adds a 802.11n (5.0 GHz) radio mesh connection. Syntax: <priority> Defines the connection priority (1-16). <mac> Sets the access point MAC address. Example: admin(network.wireless.radio.802-11n[5.0 GHz].mesh)>add 2 AA21DCDD12DE...
  • Page 458 8-120 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.radio.802-11n[5.0 GHz].mesh)> delete Description: Deletes a 802.11n (5.0 GHz) radio mesh connection by specified index or by removing all entries. Syntax: delete <idx> Deletes a mesh connection by specified index (1-16). <all> Removes all mesh connections.
  • Page 459: Network Quality Of Service (Qos) Commands

    8-121 8.3.3.5 Network Quality of Service (QoS) Commands AP7131N>admin(network.wireless.qos)> Description: Displays the access point Quality of Service (QoS) submenu. The items available under this command include: show Displays access point QoS policy information. create Defines the parameters of the QoS policy. edit Edits the settings of an existing QoS policy.
  • Page 460 8-122 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.qos)> show Description: Displays the access point’s current QoS policy by summary or individual policy. Syntax: show summary Displays all exisiting QoS policies that have been defined. policy <index> Displays the configuration for the requested QoS policy.
  • Page 461 8-123 AP7131N>admin(network.wireless.qos.create)> Description: Defines an access point QoS policy. Syntax: show Displays QoS policy parameters. qos-name <index> Sets the QoS name for the specified index entry. <index> Enables or disables support (by index) for legacy VOIP devices. mcast <mac> Defines primary and secondary Multicast MAC address. wmm-qos <index>...
  • Page 462 8-124 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.qos.edit)> Descripton: Edits the properties of an existing QoS policy. Syntax: show Displays QoS policy parameters. qos-name <index> Sets the QoS name for the specified index entry. <index> Enables or disables support (by index) for legacy VOIP devices.
  • Page 463 8-125 AP7131N>admin(network.wireless.qos)> delete Description: Removes a QoS policy. Syntax: delete <qos-name> Deletes the specified QoS polciy index, or all of the policies (except default policy). <all> For information on configuring the WLAN QoS options available to the access point using the applet (GUI), see Setting the WLAN Quality of Service (QoS) Policy on page 5-42.
  • Page 464: Network Rate Limiting Commands

    8-126 AP-7131N-FGR Access Point Product Reference Guide 8.3.3.6 Network Rate Limiting Commands AP7131N>admin(network.wireless.rate-limiting)> Description: Displays the access point Rate Limiting submenu. The items available under this command include: show Displays Rate Limiting information for how data is processed by the access point.
  • Page 465 8-127 AP7131N>admin(network.wireless.rate-limiting)> show Description: Displays the access point’s current Rate Limiting configuration. Syntax: show summary Displays the current Rate Limiting configuration for defined WLANs. wlan Example: admin(network.wireless.rate-limiting>show summary Per MU Rate Limiting : disable admin(network.wireless.rate-limiting)>show wlan Warning: This will display secure information, Do you want to continue? (n/y?)y WLAN 1 WLAN Name...
  • Page 466 8-128 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.rate-limiting)> set Description: Defines the access point Rate Limiting configuration. Syntax: set mode <mode> Enables or disables Rate Limiting. For information on configuring the Rate Limiting options available to the access point using the applet (GUI), see Configuring MU Rate Limiting on page 5-70.
  • Page 467: Network Rogue-Ap Commands

    8-129 8.3.3.7 Network Rogue-AP Commands AP7131N>admin(network.wireless.rogue-ap)> Description: Displays the Rogue AP submenu. The items available under this command include: show Displays the current access point Rogue AP detection configuration. Defines the Rogue AP detection method. mu-scan Goes to the Rogue AP mu-uscan submenu. allowed-list Goes to the Rogue AP Allowed List submenu.
  • Page 468 8-130 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.rogue-ap)> show Description: Displays the current access point Rogue AP detection configuration. Syntax: show Displays the current access point Rogue AP detection configuration. Example: admin(network.wireless.rogue-ap)>show MU Scan : disable MU Scan Interval : 60 minutes...
  • Page 469 Enables or disables AP detector scan (dual-radio model only). ABG-scan <mode> Enables or disables A/BG Detector Scan Mode. motorola-ap <mode> Enables or disables the Authorize Any AP with a Motorola MAC address option. applst-ageout <minutes> Sets the approved AP age out time. roglst-ageout <minutes>...
  • Page 470 8-132 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.rogue-ap.mu-scan)> Description: Displays the Rogue-AP mu-scan submenu. Syntax: Add all or just one scan result to Allowed AP list. show Displays all APs located by the MU scan. start Initiates scan immediately by the MU.
  • Page 471 8-133 AP7131N>admin(network.wireless.rogue-ap.mu-scan)> start Description: Initiates an MU scan from a user provided MAC address. Syntax: start <mu-mac> Initiates MU scan from user provided MAC address. For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-44.
  • Page 472 8-134 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.rogue-ap.mu-scan)> show Description: Displays the results of an MU scan. Syntax: show Displays all APs located by the MU scan. For information on configuring the Rogue AP options available to the access point using the applet (GUI), see Configuring Rogue AP Detection on page 6-44.
  • Page 473 8-135 AP7131N>admin(network.wireless.rogue-ap.allowed-list)> Description: Displays the Rogue-AP allowed-list submenu. show Displays the rogue AP allowed list Adds an AP MAC address and ESSID to the allowed list. delete Deletes an entry or all entries from the allowed list. Goes to the parent menu. Goes to the root menu.
  • Page 474 8-136 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.rogue-ap.allowed-list)> show Description: Displays the Rogue AP allowed List. Syntax: show Displays the rogue-AP allowed list. Example: admin(network.wireless.rogue-ap.allowed-list)>show Allowed AP List ----------------------------------------------------------------------------- index ap mac essid ----------------------------------------------------------------------------- 00:A0:F8:71:59:20 00:A0:F8:33:44:55 00:A0:F8:40:20:01 Marketing For information on configuring the Rogue AP options available to the access point using the applet (GUI), see...
  • Page 475 8-137 AP7131N>admin(network.wireless.rogue-ap.allowed-list)> add Description: Adds an AP MAC address and ESSID to existing allowed list. Syntax: <mac-addr> Adds an AP MAC address and ESSID to existing allowed list. “fffffffffffffffff” means any MAC <ess-id> Use a “*” for any ESSID. Example: admin(network.wireless.rogue-ap.allowed-list)>add 00A0F83161BB 103 admin(network.wireless.rogue-ap.allowed-list)>show -----------------------------------------------------------------------------...
  • Page 476 8-138 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.rogue-ap.allowed-list)> delete Description: Deletes an AP MAC address and ESSID to existing allowed list. Syntax: delete <idx> (1-50) Deletes an AP MAC address and ESSID (or all addresses) from the allowed list. <all>...
  • Page 477: Wips Commands

    8-139 8.3.3.8 WIPS Commands AP7131N>admin(network.wireless.wips)> Description: Displays the WIPS submenu. The items available under this command include: show Displays the current WLAN Intrusion Prevention configuration. Sets WLAN Intrusion Prevention parameters. Goes to the parent menu. Goes to the root menu. save Saves the configuration to system flash.
  • Page 478 8-140 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.wips> show Description: Shows the WLAN Intrusion Prevention configuration. Syntax: show Displays the WLAN Intrusion Prevention configuration. Example: admin(network.wireless.wips>show Warning: This will display secure information, Do you want to continue? (n/y?)y WIPS Server #1 IP Address : 192.168.0.21...
  • Page 479 8-141 AP7131N>admin(network.wireless.wips set Description: Sets the WLAN Intrusion Prevention configuration. Syntax: <idx 1 and 2> <ip> Defines the WLAN Intrusion Prevention Server IP Address (for server IPs 1 and 2). Example: admin(network.wireless.wips)>set server 1 192.168.0.21 admin(network.wireless.wips)>...
  • Page 480: Network Mu Locationing Commands

    8-142 AP-7131N-FGR Access Point Product Reference Guide 8.3.3.9 Network MU Locationing Commands AP7131N>admin(network.wireless.mu-locationing)> Description: Displays the MU Locationing submenu. The items available under this command include: show Displays the current MU Locationing configuration. Defines MU Locationing parameters. Goes to the parent menu.
  • Page 481 8-143 AP7131N>admin(network.wireless.mu-locationing> show Description: Displays the MU probe table configuration Syntax: show Displays the MU probe table configuration. Example: admin(network.wireless.mu-locationing)>show MU Probe Table Mode : disable MU Probe Table Size : 200 admin(network.wireless.mu-locationing)>...
  • Page 482 8-144 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.wireless.mu-locationing> set Description: Defines the MU probe table configuration used for locating MUs. Syntax: Defines the MU probe table configuration. mode Enables/disables a mu probe scan. size Defines the number of MUs in the table (the maximum allowed is 200).
  • Page 483: Network Firewall Commands

    8-145 8.3.4 Network Firewall Commands AP7131N>admin(network.firewall)> Description: Displays the access point firewall submenu. The items available under this command include: show Displays the access point’s current firewall configuration. Defines the access point’s firewall parameters. access Enables/disables firewall permissions through the LAN and WAN ports. advanced Displays interoperaility rules between the LAN and WAN ports.
  • Page 484 8-146 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.firewall)> show Description: Displays the access point firewall parameters. Syntax: show Shows all access point firewall settings. Example: admin(network.firewall)>show Firewall Status : disable NAT Timeout : 10 minutes Configurable Firewall Filters: ftp bounce attack filter...
  • Page 485 8-147 AP7131N>admin(network.firewall)> set Description: Defines the access point firewall parameters. Syntax: set mode <mode> Enables or disables the firewall. nat-timeout <interval> Defines the NAT timeout value. <mode> Enables or disables SYN flood attack check. <mode> Enables or disables source routing check. <mode>...
  • Page 486 8-148 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.firewall)> access Description: Enables or disables firewall permissions through LAN to WAN ports. Syntax: show Displays LAN to WAN access rules. Sets LAN to WAN access rules. Adds LAN to WAN exception rules.
  • Page 487 8-149 AP7131N>admin(network.firewall)> advanced Description: Displays whether an access point firewall rule is intended for inbound traffic to an interface or outbound traffic from that interface.. Syntax: show Shows advanced subnet access parameters. Sets advanced subnet access parameters. import Imports rules from subnet access. inbound Goes to the Inbound Firewall Rules submenu.
  • Page 488: Network Router Commands

    8-150 AP-7131N-FGR Access Point Product Reference Guide 8.3.5 Network Router Commands AP7131N>admin(network.router)> Description: Displays the router submenu. The items available under this command are: show Displays the existing access point router configuration. Sets the RIP parameters. Adds user-defined routes. delete Deletes user-defined routes.
  • Page 489 8-151 AP7131N>admin(network.router)> show Description: Shows the access point route table. Syntax: show Shows the access point route table. Example: admin(network.router)>show routes ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 0.0.0.0 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2 192.168.0.0 255.255.255.0 0.0.0.0 lan1 192.168.24.0 255.255.255.0...
  • Page 490 8-152 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.router)> set Description: Shows the access point route table. Syntax: set auth Sets the RIP authentication type (none, simple or MD5). Sets RIP direction (rx, tx or both) Sets MD5 authetication ID (1-256) for specific index (1-2).
  • Page 491 8-153 AP7131N>admin(network.router)> add Description: Adds user-defined routes. Syntax: <dest> <netmask> <gw> <iface> <metric> Adds a route with destination IP address <dest>, IP netmask <netmask>, destination gateway IP address <gw>, interface LAN1, LAN2 or WAN <iface>, and metric set <metric> to (1-65536).
  • Page 492 8-154 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(network.router)> delete Description: Deletes user-defined routes. Syntax: delete <idx> Deletes the user-defined route <idx> (1-20) from list. Deletes all user-defined routes. Example: admin(network.router)>list ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 192.168.0.1...
  • Page 493 8-155 AP7131N>admin(network.router)> list Description: Lists user-defined routes. Syntax: list Displays a list of user-defined routes. Example: admin(network.router)>list ---------------------------------------------------------------------------- index destination netmask gateway interface metric ---------------------------------------------------------------------------- 192.168.2.0 255.255.255.0 192.168.0.1 lan1 192.168.1.0 255.255.255.0 0.0.0.0 lan2 192.168.0.0 255.255.255.0 0.0.0.0 lan1 For information on configuring the Router options available to the access point using the applet (GUI), see Configuring Router Settings on page 5-71.
  • Page 494: System Commands

    8-156 AP-7131N-FGR Access Point Product Reference Guide 8.4 System Commands AP7131N>admin(system)> Description: Displays the System submenu. The items available under this command are shown below. restart Restarts the access point. show Shows access point system parameter settings. Defines access point system parameter settings.
  • Page 495 ** Please be sure to save changes before resetting. ************************************************************************** Are you sure you want to restart the AP-7131N?? (yes/no): AP-7131N Boot Firmware Version 4.0.0.0-002GDN Copyright(c) Motorola 2009. All rights reserved. Press escape key to run boot firmware ..Power On Self Test testing ram...
  • Page 496 8-158 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system)>show Description: Displays high-level system information helpful to differentiate this access point. Syntax: show Displays access point system information. Example: admin(system)>show system name : AP-7131N system location : Atlanta Field Office admin email address : johndoe@mycompany.com...
  • Page 497 8-159 AP7131N>admin(system)>set Description: Sets access point system parameters. Syntax: set name <name> Sets the access point system name to <name> (1 to 59 characters). The access point does not allow intermediate space characters between characters within the system name. For example, “AP7131N sales” must be changed to “AP7131Nsales”...
  • Page 498 8-160 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system)>lastpw Description: Displays last expired debug password. Example: admin(system)>lastpw AP-7131N MAC Address is 00:15:70:02:7A:66 Last debug password was motorola Current debug password used 0 times, valid 4 more time(s) admin(system)>...
  • Page 499 8-161 AP7131N>admin(system)>arp Description: Dispalys the access point’s arp table. Example: admin(system)>arp IP Address HWtype HWaddress Flags Mask Device 157.235.92.210 ether 00:11:25:14:61:A8 157.235.92.179 ether 00:14:22:F3:D7:39 157.235.92.248 ether 00:11:25:B2:09:60 157.235.92.180 ether 00:0D:60:D0:06:90 157.235.92.3 ether 00:D0:2B:A0:D4:FC 157.235.92.181 ether 00:15:C5:0C:19:27 157.235.92.80 ether 00:11:25:B2:0D:06 157.235.92.95 ether 00:14:22:F9:12:AD 157.235.92.161...
  • Page 500: Power Setup Commands

    8-162 AP-7131N-FGR Access Point Product Reference Guide 8.4.1 Power Setup Commands AP7131N>admin(system)>power-setup Description: Displays the Power Setup submenu. show Displays the current power setting configuration. Defines the access point’s power setting configuration. Goes to the parent menu. Goes to the root menu.
  • Page 501 8-163 AP7131N>admin(system.power-setup)>show Description: Displays the access point’s current power configuration. Syntax: show Displays the access point’s current power configuration. Example: admin(system.power-setup)>show Power Mode : 3af Power Status : Mid Power 3af Power Option : option 3at Power Option : default Default Radio : Radio2 admin(system.power-setup)>...
  • Page 502 8-164 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.power-setup)>set Description: Sets access point’s power consumption configuration. Syntax: set mode Sets the power mode to either Auto or 3af. power-option Defines the power option. def-radio Defines the radio receiving access port resource priority (1-Radio1, 2-Radio2).
  • Page 503: Adaptive Ap Setup Commands

    8-165 8.4.2 Adaptive AP Setup Commands AP7131N>admin(system)>aap-setup Description: Displays the Adaptive AP submenu. show Displays Adaptive AP information. Defines the Adaptive AP configuration. delete Deletes static switch address assignments. Goes to the parent menu. Goes to the root menu. save Saves the current configuration to the access point system flash.
  • Page 504 8-166 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.aap-setup)>show Description: Displays the access point’s Adaptive AP configuration. Syntax: show Displays the access point’s Adaptive AP configuration. Example: admin(system.aap-setup)>show Auto Discovery Mode : disable Switch Interface : lan1 Switch Name : greg...
  • Page 505 8-167 AP7131N>admin(system.aap-setup)>set Description: Sets access point’s Adaptive AP configuration. Syntax: set auto-discovery Sets the switch auto-discovery mode (enable/disable). ipadr Defines the switch IP address used. name Defines the switch name for DNS lookups (up to 127 characters). port Sets the port. passphrase Defines the pass phrase or key for switch connection.
  • Page 506 8-168 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.aap-setup)>delete Description: Deletes static switch address assignments. Syntax: delete <idx> Deletes static switch address assignments by selected index. <all> Deletes all assignments. Example: admin(system.aap-setup)>delete 1 admin(system.aap-setup)> For information on configuring Adaptive AP using the applet (GUI), see Adaptive AP Setup on page 4-11.
  • Page 507: System Access Commands

    8-169 8.4.3 System Access Commands AP7131N>admin(system)>access Description: Displays the access point access submenu. show Displays access point system access capabilities. Goes to the access point system access submenu. Goes to the parent menu. Goes to the root menu. save Saves the current configuration to the access point system flash. quit Quits the CLI and exits the current session.
  • Page 508 8-170 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.access)>set Description: Defines the permissions to access the access point applet, CLI, SNMP as well as defining their timeout values. Syntax: set applet Defines the applet HTTP/HTTPS access parameters. app-timeout <minutes> Sets the applet timeout. Default is 300 Mins.
  • Page 509 8-171 AP7131N>admin(system.access)>show Description: Displays the current access point access permissions and timeout values. Syntax: show Shows all of the current system access settings for the access point.. Example: admin(system.access)>show Warning: This will display secure information, Do you want to continue? (n/y?)y -------------------------------From LAN1-------From LAN2-------From WAN applet http access enable...
  • Page 510: System Certificate Management Commands

    8-172 AP-7131N-FGR Access Point Product Reference Guide 8.4.4 System Certificate Management Commands AP7131N>admin(system)>cmgr Description: Displays the Certificate Manager submenu. The items available under this command include: genreq Generates a Certificate Request. delself Deletes a Self Certificate. loadself Loads a Self Certificate signed by CA.
  • Page 511 8-173 AP7131N>admin(system.cmgr)> genreq Description: Generates a certificate request. Syntax: genreq <IDname> <Subject> [-ou <OrgUnit>] [-on <OrgName>] [-cn <City>] [-st <State>] ..[-p <PostCode>] [-cc <CCode>] [-e <Email>] [-d <Domain>] [-i <IP>] [-sa <SAlgo>] Generates a self-certificate request for a Certification Authority (CA), where: <IDname>...
  • Page 512 8-174 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.cmgr)> delself Description: ) Deletes a self certificate. Syntax: delself <IDname> Deletes the self certificate named <IDname>. Example: admin(system.cmgr)>delself MyCert2 For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-21.
  • Page 513 8-175 AP7131N>admin(system.cmgr)> loadself Description: Loads a self certificate signed by the Certificate Authority. Syntax: loadself <IDname> Load the self certificate signed by the CA with name <IDname>. For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-21.
  • Page 514 8-176 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.cmgr)> listself Description: Lists the loaded self certificates. Syntax: listself Lists all self certificates that are loaded. For information on configuring self certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-21.
  • Page 515 8-177 AP7131N>admin(system.cmgr)> loadca Description: Loads a trusted certificate from the Certificate Authority. Syntax: loadca Loads the trusted certificate (in PEM format only) that is pasted into the command line. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-19.
  • Page 516 8-178 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.cmgr)> delca Description: Deletes a trusted certificate. Syntax: delca <IDname> Deletes the trusted certificate. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-19.
  • Page 517 8-179 AP7131N>admin(system.cmgr)> listca Description: Lists the loaded trusted certificate. Syntax: listca Lists the loaded trusted certificates. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-19.
  • Page 518 8-180 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.cmgr)> showreq Description: Displays a certificate request in PEM format. Syntax: showreq <IDname> Displays a certificate request named <IDname> generated from the genreq command. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page 4-19.
  • Page 519 8-181 AP7131N>admin(system.cmgr)> delprivkey Description: Deletes a private key. Syntax: delprivkey <IDname> Deletes private key named <IDname>. For information on configuring certificate settings using the applet (GUI), see Creating Self Certificates for Accessing the VPN on page 4-21.
  • Page 520 8-182 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.cmgr)> listprivkey Description: Lists the names of private keys. Syntax: listprivkey Lists all private keys and displays their certificate associations. For information on configuring certificate settings using the applet (GUI), see Importing a CA Certificate on page...
  • Page 521 8-183 AP7131N>admin(system.cmgr)> expcert Description: Exports the certificate file to a user defined location. Syntax: expcert Exports the access point’s CA or Self certificate file. To export certificate information from an AP-7131N model access point: admin(system.cmgr)>expcert ? <type> <file name> <cr> : type: sftp : file name: Certificate file name : Server options for this file are the same...
  • Page 522 8-184 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.cmgr)> impcert Description: Imports the target certificate file. Syntax: impcert Imports the target certificate file. To import certificate information from an AP-7131N model access point: admin(system.cmgr)>impcert ? <type> <file name> <cr> : type: sftp...
  • Page 523: System Snmp Commands

    8-185 8.4.5 System SNMP Commands AP7131N>admin(system)> snmp Description: Displays the SNMP submenu. The items available under this command are shown below. access Goes to the SNMP access submenu. traps Goes to the SNMP traps submenu. Goes to the parent menu. Goes to the root menu.
  • Page 524: System Snmp Access Commands

    8-186 AP-7131N-FGR Access Point Product Reference Guide 8.4.5.1 System SNMP Access Commands AP7131N>admin(system.snmp.access) Description: Displays the SNMP Access menu. The items available under this command are shown below. show Shows SNMP v3 engine ID. Adds SNMP access entries. delete Deletes SNMP access entries.
  • Page 525 8-187 AP7131N>admin(system.snmp.access)> show Description: Shows the SNMP v3 engine ID. Syntax: show Shows the SNMP v3 Engine ID. Example: admin(system.snmp.access)>show eid AP-7131N snmp v3 engine id : 000001846B8B4567F871AC68 admin(system.snmp.access)> For information on configuring SNMP access settings using the applet (GUI), see Configuring SNMP Access Control on page 4-35.
  • Page 526 8-188 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.snmp.access)> add Description: Adds SNMP access entries for specific v1v2 and v3 user definitions. Syntax: add acl <ip1> <ip2> Adds an entry to the SNMP access control list with <ip1> as the starting IP address and <ip2>...
  • Page 527 8-189 AP7131N>admin(system.snmp.access)> delete Description: Deletes SNMP access entries for specific v1v2 and v3 user definitions. Syntax: delete acl <idx> Deletes entry <idx> (1-10) from the access control list. Deletes all entries from the access control list. v1v2c <idx> Deletes entry <idx> (1-10) from the v1/v2 configuration list. Deletes all entries from the v1/v2 configuration list.
  • Page 528 8-190 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.snmp.access)> list Description: Lists SNMP access entries. Syntax: list acl Lists SNMP access control list entries. v1v2c Lists SNMP v1/v2c configuration. <idx> Lists SNMP v3 user definition by index <idx> (1-10). Lists all SNMP v3 user definitions.
  • Page 529: System Snmp Traps Commands

    8-191 8.4.5.2 System SNMP Traps Commands AP7131N>admin(system.snmp.traps) Description: Displays the SNMP traps submenu. The items available under this command are shown below. show Shows SNMP trap parameters. Sets SNMP trap parameters. Adds SNMP trap entries. delete Deletes SNMP trap entries. list Lists SNMP trap entries.
  • Page 530 8-192 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.snmp.traps)> show Description: Shows SNMP trap parameters. Syntax: show trap Shows SNMP trap parameter settings. rate-trap Shows SNMP rate-trap parameter settings. Example: admin(system.snmp.traps)>show trap SNMP MU Traps mu associated : enable mu unassociated...
  • Page 531 8-193 AP7131N>admin(system.snmp.traps)> set Description: Sets SNMP trap parameters. Syntax: set mu-assoc enable/disable Enables/disables the MU associated trap. mu-unassoc enable/disable Enables/disables the MU unassociated trap. mu-deny-assoc enable/disable Enables/disables the MU association denied trap. mu-deny-auth enable/disable Enables/disables the MU authentication denied trap. snmp-auth enable/disable Enables/disables the authentication failure trap.
  • Page 532 8-194 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.snmp.traps)> add Description: Adds SNMP trap entries. Syntax: add v1v2 <ip> <port> <comm> <ver> Adds an entry to the SNMP v1/v2 access list with the destination IP address set to <ip>, the destination UDP port set to <port>, the community string set to <comm>...
  • Page 533 8-195 AP7131N>admin(system.snmp.traps)> delete Description: Deletes SNMP trap entries. Syntax: delete v1v2c <idx> Deletes entry <idx> from the v1v2c access control list. Deletes all entries from the v1v2c access control list. <idx> Deletes entry <idx> from the v3 access control list. Deletes all entries from the v3 access control list.
  • Page 534 8-196 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.snmp.traps)> list Description: Lists SNMP trap entries. Syntax: list v1v2c Lists SNMP v1/v2c access entries. <idx> Lists SNMP v3 access entry <idx 1-10> . Lists all SNMP v3 access entries. Example: admin(system.snmp.traps)>add v1v2 203.223.24.2 162 mycomm v1 admin(system.snmp.traps)>list v1v2c...
  • Page 535: System User Database Commands

    8-197 8.4.6 System User Database Commands AP7131N>admin(system)> userdb Description: Goes to the user database submenu. Syntax: user Goes to the user submenu. group Goes to the group submenu. save Saves the configuration to system flash. Goes to the parent menu. Goes to the root menu.
  • Page 536 8-198 AP-7131N-FGR Access Point Product Reference Guide 8.4.5.1 Adding and Removing Users from the User Databse AP7131N>admin(system.userdb)> user Description: Adds and remvoves users from the user database and defines user passwords. Syntax: Adds a new user. delete Deletes a new user.
  • Page 537 8-199 AP7131N>admin(system.userdb.user)> add Description: Adds a new user to the user database. Syntax: Adds a new user ID <id> and password <pw> string (8-19 characters) to the user database. Example: admin(system.userdb.user>add george password admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-67.
  • Page 538 8-200 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.userdb.user)> delete Description: Removes a new user to the user database. Syntax: delete Removes a user ID <id> and password <pw> string from the user database. Example: admin(system.userdb.user>delete george admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see...
  • Page 539 8-201 AP7131N>admin(system.userdb.user)>clearall Description: Removes all existing user IDs from the system. Syntax: clearall Removes all existing user IDs from the system. Example: admin(system.userdb.user>clearall admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-67.
  • Page 540 8-202 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.userdb.user)>set Description: Sets a password for a user.. Syntax: <user> <pw> Sets user <id> and password <pw> string (8-19 characters) for a specific user. Example: admin(system.userdb.user>set george password admin(system.userdb.user> For information on configuring User Database permissions using the applet (GUI), see...
  • Page 541 8-203 8.4.5.2 Adding and Removing Groups from the User Databse AP7131N>admin(system.userdb)> group Description: Adds and remvoves groups from the user database. Syntax: create Creates a group name. delete Deletes a group name. clearall Removes all existing group names from the system. Adds a user to an existing group.
  • Page 542 8-204 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.userdb.group> create Description: Creates a group name. Once defined, users can be added to the group. Syntax: create Creates a group name string. Once defined, users can be added to the group. Example: admin(system.userdb.group>create 2...
  • Page 543 8-205 AP7131N>admin(system.userdb.group> delete Description: Deletes an existing group. Syntax: delete Deletes an existing group name string. Example: admin(system.userdb.group>delete 2 admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-67.
  • Page 544 8-206 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.userdb.group> clearall Description: Removes all existing group names from the system. Syntax: clearall Removes all existing group names from the system. Example: admin(system.userdb.group>clearall admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see...
  • Page 545 8-207 AP7131N>admin(system.userdb.group> add Description: Adds a user to an existing group. Syntax: <userid> <group> Adds a user <userid> to an existing group <group>. Example: admin(system.userdb.group>add lucy group x admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see Defining User Access Permissions by Group on page 6-67.
  • Page 546 8-208 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.userdb.group> remove Description: Removes a user from an existing group. Syntax: remove <userid> <group> Removes a user <userid> from an existing group<group> . Example: admin(system.userdb.group>remove lucy group x admin(system.userdb.group> For information on configuring User Database permissions using the applet (GUI), see...
  • Page 547 8-209 AP7131N>admin(system.userdb.group> show Description: Displays existing groups. Syntax: show Displays existing groups and users, users Displays configured user IDs for a group. groups Displays configured groups. Example: admin(system.userdb.group>show groups Warning: This will display secure information, Do you want to continue? (n/y?)y List of Group Names : engineering : marketing...
  • Page 548: System Radius Commands

    8-210 AP-7131N-FGR Access Point Product Reference Guide 8.4.7 System Radius Commands AP7131N>admin(system)> radius Description: Goes to the Radius system submenu. Syntax: Goes to the EAP submenu. policy Goes to the access policy submenu. ldap Goes to the LDAP submenu. proxy Goes to the proxy submenu.
  • Page 549 8-211 AP7131N>admin(system.radius)> set/show Description: Sets or displays the Radius user database. Syntax: Sets the Radius user database. show all Displays the Radius user database. Example: admin(system.radius)>set database local admin(system.radius)>show all Database : local admin(system.radius)> For information on configuring Radius using the applet (GUI), see Configuring User Authentication on page 6-54.
  • Page 550 8-212 AP-7131N-FGR Access Point Product Reference Guide 8.4.6.1 AP7131N>admin(system.radius)> eap Description: Goes to the EAP submenu. Syntax: peap Goes to the Peap submenu. ttls Goes to the TTLS submenu. import Imports the requested EAP certificates. Defines EAP parameters. show Displays the EAP configuration.
  • Page 551 8-213 AP7131N>admin(system.radius.eap)> peap Description: Goes to the Peap submenu. Syntax: Defines Peap parameters. show Displays the Peap configuration. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring PEAP Radius using the applet (GUI), see Configuring User Authentication on page 6-54.
  • Page 552 8-214 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.eap.peap> set/show Description: Defines and displays Peap parameters Syntax: Sets the Peap authentication <type>. show Displays the Peap authentication type. Example: admin(system.radius.eap.peap)>set auth gtc admin(system.radius.eap.peap)>show PEAP Auth Type : gtc For information on configuring EAP PEAP Radius values using the applet (GUI), see Configuring User Authentication on page 6-54.
  • Page 553 8-215 AP7131N>admin(system.radius.eap)> ttls Description: Goes to the TTLS submenu. Syntax: Defines TTLS parameters. show Displays the TTLS configuration. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring EAP TTLS Radius values using the applet (GUI), see Configuring User Authentication on page 6-54.
  • Page 554 8-216 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.eap.ttls> set/show Description: Defines and displays TTLS parameters Syntax: Sets the default TTLS authentication <type>. show Displays the TTLS authentication <type>. Example: admin(system.radius.eap.ttls)>set auth pap admin(system.radius.eap.ttls)>show TTLS Auth Type : pap For information on configuring EAP TTLS Radius values using the applet (GUI), see Configuring User Authentication on page 6-54.
  • Page 555 8-217 8.4.6.2 AP7131N>admin(system.radius)> policy Description: Goes to the access policy submenu. Syntax: Sets a group’s WLAN access policy. access-time Goes to the time based login submenu. show Displays the group’s access policy. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 556 8-218 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.policy> set Description: Defines the group’s WLAN access policy. Syntax: <group name> Defines the group’s <group name> WLAN access policy (defined as a string) delimited by a space.. <wlan name> Example: admin(system.radius.policy)>set engineering 16 admin(system.radius.policy)>...
  • Page 557 8-219 AP7131N>admin(system.radius.policy> access-time Description: set Goes to the time-based login submenu. Syntax: <group> Defines a target group’s access time permissions. Access time is in DayDDDD-DDDD format. <access-time> show Displays the group’s access time rule. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 558 8-220 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.policy> show Description: Displays a group’s access policy. Syntax: show Displays a group’s access policy. Example: admin(system.radius.policy)>show Warning: This will display secure information, Do you want to continue? (n/y?)y List of Access Policies...
  • Page 559 8-221 8.4.6.3 AP7131N>admin(system.radius)> ldap Description: Goes to the LDAP submenu. Syntax: Defines the LDAP parameters. show all Displays existing LDAP parameters. save Saves the configuration to system flash. quit Quits the CLI. Goes to the parent menu. Goes to the root menu. For information on configuring a Radius LDAP server using the applet (GUI), see Configuring LDAP Authentication on page 6-58.
  • Page 560 8-222 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.ldap)> set Description: Defines the LDAP parameters. Syntax: Defines the LDAP parameters. ipadr Sets LDAP IP address. binddn Sets LDAP bind distinguished name. basedn Sets LDAP base distinguished name. passwd Sets LDAP server password.
  • Page 561 8-223 AP7131N>admin(system.radius.ldap)> show all Description: Displays existing LDAP parameters. Syntax: show all Displays existing LDAP parameters. Example: admin(system.radius.ldap)>show all Warning: This will display secure information, Do you want to continue? (n/y?)y LDAP Server IP 0.0.0.0 LDAP Server Port LDAP Bind DN cn=manager, o=trion LDAP Base DN 0=trion...
  • Page 562 8-224 AP-7131N-FGR Access Point Product Reference Guide 8.4.6.4 AP7131N>admin(system.radius)> proxy Description: Goes to the Radius proxy server submenu. Syntax: Adds a proxy realm. delete Deletes a proxy realm. clearall Removes all proxy server records. Sets proxy server parameters. show Displays current Radius proxy server parameters.
  • Page 563 8-225 AP7131N>admin(system.radius.proxy)> add Description: Adds a proxy. Syntax: Adds a proxy realm. name <name> Realm name. <ip1> Authentication server IP address. <sec> Shared secret password. Example: admin(system.radius.proxy)>add lancelot 157.235.241.22 1812 muddy admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-61.
  • Page 564 8-226 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.proxy)> delete Description: Adds a proxy. Syntax: delete <name> Deletes a realm name. Example: admin(system.radius.proxy)>delete lancelot admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page...
  • Page 565 8-227 AP7131N>admin(system.radius.proxy)> clearall Description: Removes all proxy server records from the system. Syntax: clearall Removes all proxy server records from the system. Example: admin(system.radius.proxy)>clearall admin(system.radius.proxy)> For information on configuring Radius proxy server values using the applet (GUI), see Configuring a Proxy Radius Server on page 6-61.
  • Page 566 8-228 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.proxy)> set Description: Sets Radius proxy server parameters. Syntax: Sets Radius proxy server parameters. delay Defines retry delay time (in seconds) for the proxy server. count Defines retry count value for the proxy server.
  • Page 567 8-229 8.4.6.5 AP7131N>admin(system.radius)> client Description: Goes to the Radius client submenu. Syntax: Adds a Radius client to list of available clients. delete Deletes a Radius client from list of available clients. show Displays a list of configured clients. save Saves the configuration to system flash. quit Quits the CLI.
  • Page 568 8-230 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.client> add Description: Adds a Radius client to those available to the Radius server. Syntax: Adds a proxy. <ip> Client’s IP address. mask <ip1> Network mask address of the client. secret <sec> Shared secret password.
  • Page 569 8-231 AP7131N>admin(system.radius.client> delete Description: Removes a specified Radius client from those available to the Radius server. Syntax: delete Removes a specified Radius client <ipadr> from those available to the Radius server Example: admin(system.radius.client)>delete 157.235.132.11 admin(system.radius.client)> For information on configuring Radius client values using the applet (GUI), see Configuring the Radius Server on page 6-54.
  • Page 570 8-232 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.radius.client> show Description: Displays a list of configured Radius clients. Syntax: show Removes a specified Radius client from those available to the Radius server. Example: admin(system.radius.client)>show Warning: This will display secure information, Do you want to continue? (n/y?)y...
  • Page 571: System Network Time Protocol (Ntp) Commands

    8-233 8.4.8 System Network Time Protocol (NTP) Commands AP7131N>admin(system)> ntp Description: Displays the NTP menu. The correct network time is required for numerous functions to be configured accurately on the access point. Syntax: show Shows NTP parameters settings. date-zone Show date, time and time zone. zone-list Displays list of time zones.
  • Page 572 8-234 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.ntp)> show Description: Displays the NTP server configuration. Syntax: show Shows all NTP server settings. Example: admin(system.ntp)>show current time (UTC) : 2006-07-31 14:35:20 Time Zone: ntp mode : enable preferred Time server ip : 203.21.37.18...
  • Page 573 8-235 AP7131N>admin(system.ntp)> date-zone Description: Show date, time and time zone. Syntax: date-zone Show date, time and time zone. Example: date-zone admin(system.ntp)> Date/Time : Sat 1970-Jan-03 20:06:22 +0000 UTC Time Zone : UTC For information on configuring NTP using the applet (GUI), see Configuring Network Time Protocol (NTP) on page 4-44.
  • Page 574 8-236 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.ntp)> zone-list Description: Displays an extensive list of time zones for countries around the world. Syntax: zone-list Displays list of time zone indexes for every known zone. Example: zone-list admin(system.ntp)> For information on configuring NTP using the applet (GUI), see Configuring Network Time Protocol (NTP) on page 4-44.
  • Page 575 8-237 AP7131N>admin(system.ntp)> set Description: Sets NTP parameters for access point clock synchronization. Syntax: set mode <ntp-mode> Enables or disables NTP. server <idx> <ip> Sets the NTP sever IP address. intrvl <period> Defines the clock synchronization interval used between the access point and the NTP server in minutes (15 - 65535).
  • Page 576: System Log Commands

    8-238 AP-7131N-FGR Access Point Product Reference Guide 8.4.9 System Log Commands AP7131N>admin(system)> logs Description: Displays the access point log submenu. Logging options include: Syntax: show Shows logging options. Sets log options and parameters. view Views system log. delete Deletes the system log.
  • Page 577 8-239 AP7131N>admin(system.logs)> show Description: Displays the current access point logging settings. Syntax: show Displays the current access point logging configuration. Example: admin(system.logs)>show log level : L6 Info syslog server logging : enable syslog server ip address : 192.168.0.102 For information on configuring logging settings using the applet (GUI), see Logging Configuration on page 4-48.
  • Page 578 8-240 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.logs)> set Description: Sets log options and parameters. Syntax: level <level> Sets the level of the events that will be logged. All events with a level at or above <level> (L0-L7) will be saved to the system log.
  • Page 579 8-241 AP7131N>admin(system.logs)> view Description: Displays the access point system log file. Syntax: view Displays the entire access point system log file. Example: admin(system.logs)>view Warning: This will display secure information, Do you want to continue? (n/y?)y 7 16:14:00 (none) syslogd 1.4.1: restart (remote reception). 7 16:14:10 (none) klogd: :ps log:fc: queue maintenance 7 16:14:41 (none) klogd: :ps log:fc: queue maintenance 7 16:15:43 (none) last message repeated 2 times...
  • Page 580 8-242 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.logs)> delete Description: Deletes the log files. Syntax: delete Deletes the access point system log file. Example: admin(system.logs)>delete For information on configuring logging settings using the applet (GUI), see Logging Configuration on page...
  • Page 581: System Configuration-Update Commands

    8-243 8.4.10 System Configuration-Update Commands AP7131N>admin(system.config)> Description: Displays the access point configuration update submenu. Syntax: default Restores the default access point configuration. partial Restores a partial default access point configuration. show Shows import/export parameters. Sets import/export access point configuration parameters. export Exports access point configuration to a designated system.
  • Page 582 8-244 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.config)> default Description: Restores the full access point factory default configuration. Syntax: default Restores the access point to the original (factory) configuration. Example: admin(system.config)>default Are you sure you want to default the configuration? <yes/no>:...
  • Page 583 8-245 AP7131N>admin(system.config)> partial Description: Restores a partial factory default configuration. The access point’s LAN, WAN and SNMP settings are uneffected by the partial restore. Syntax: default Restores a partial access point configuration. Example: admin(system.config)>partial Are you sure you want to partially default AP-7131N? <yes/no>: For information on importing/exporting access point configurations using the applet (GUI), see Importing/Exporting Configurations on page...
  • Page 584 8-246 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.config)> show Description: Displays import/export parameters for the access point configuration file. Syntax: show Shows all import/export parameters. Example: admin(system.config)>show Warning: This will display secure information, Do you want to continue? (n/y?)y cfg filename : cfg.txt...
  • Page 585 8-247 AP7131N>admin(system.config)> set Description: Sets the import/export parameters. Syntax: file <filename> Sets the configuration file name (1 to 39 characters in length). path <path> Defines the path used for the configuration file upload. server <ipaddress> Sets the SFTP server IP address. user <username>...
  • Page 586 8-248 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.config)> export Description: Exports the configuration from the system. Syntax: export sftp Exports the access point configuration to the SFTP server. Use the set command to set the server, user, password, and file name before using this command.
  • Page 587 In turn, a dual-radio model access point cannot import/export its configuration to a single-radio access point. CAUTION Motorola discourages importing a 1.0 baseline configuration file to a 1.1 (or later) version access point. Similarly, a 2.0 baseline configuration file should not be imported to a 1.0 version access point.
  • Page 588 8-250 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.config)>transfer_keys Description: Exports SSH keys in order to turn off interactive mode. Syntax: transfer_keys Exports SSH keys in order to turn off interactive mode.xx Example: admin(system.config>transfer_keys Transfer of ssh public key in progress ssh: cxonnexct to host 157.235.112.21 port 22:...
  • Page 589: Firmware Update Commands

    8-251 8.4.11 Firmware Update Commands AP7131N>admin(system)>fw-update Description: Displays the firmware update submenu. The items available under this command are shown below. NOTE The access point must complete the reboot process to successfully update the device firmware, regardless of whether the reboot is conducted uing the GUI or CLI interfaces. show Displays the current access point firmware update settings.
  • Page 590 8-252 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.fw-update)>show Description: Displays the current access point firmware update settings. Syntax: show Shows the current system firmware update settings for the access point. Example: admin(system.fw-update)>show Warning: This will display secure information, Do you want to continue? (n/y?)y firmware filename : apn.bin...
  • Page 591 8-253 AP7131N>admin(system.fw-update)>set Description: Defines access point firmware update settings and user permissions. Syntax: file <name> Defines the firmware file name (1 to 39 characters). path <path> Specifies a path for the file (1 to 39 characters).. server <ip> The IP address for the SFTP server used for the firmware and/or config file update. user <name>...
  • Page 592 8-254 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.fw-update)>update Description: Executes the access point firmware update over the WAN or LAN port using SFTP. Syntax: update <mode><iface> Defines the sftp mode used to conduct the firmware update. Specifies whether the update is executed over the access point’s WAN, LAN1 or LAN2 interface <iface>.
  • Page 593: Fips Test Commands

    8-255 8.4.12 FIPS Test Commands AP7131N>admin(system)>fips-test Description: Displays the fips-test submenu. The items available under this command are shown below. testccmp Performs ccmp self test. zeroisekeys Zeroization of critical security parameters. showlog Displays the PoST Log File success or error status. Goes to the parent menu.
  • Page 594 8-256 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.fips-test)>testccmp Description: Execute this command to perform a ccmp self test.. Syntax: testccmp Conducts a ccmp self test. admin(system.fips-test)>testccmp CCMP Test Passed admin(system.fips-test)>...
  • Page 595 8-257 AP7131N>admin(system.fips-test)>zeroisekeys Description: Conducts a zeroization of critical security parameters by restrating the access point and restoring its default configuration. A new, more secure, passowrd will then be required. Syntax: zeroisekeys Conducts a zeroization of critical security parameters. The country code must be supplied to continue with the CLI session.
  • Page 596 8-258 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(system.fips-test)>showlog Description: Displays the PoST Logs File <file> success or error state. Syntax: showlog <file> Displays the PoST Logs File <file> success or error state. showlog stem.fips admin(sy -test)> admin(system.fips-test)>...
  • Page 597: Statistics Commands

    8-259 8.5 Statistics Commands AP7131N>admin(stats) Description: Displays the access point statistics submenu. The items available under this command are: show Displays access point WLAN, MU, LAN and WAN statistics. send-cfg-ap Sends a config file to another access point within the known AP table. send-cfg-all Sends a config file to all access points within the known AP table.
  • Page 598 8-260 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(stats)> show Description: Displays access point system information. Syntax: show Displays stats for the access point WAN port. Displays stats for the access point LAN port Displays LAN Spanning Tree Status wlan Displays WLAN status and statistics summary.
  • Page 599 8-261 AP7131N>admin(stats)> send-cfg-ap Description: Copies the access point’s configuration to another access point within the known AP table. Syntax: send-cfg-ap <index> Copies the access point’s configuration to the access points within the known AP table. Mesh configuration attributes do not get copied using this command and must be configured manually. Example: admin(stats)>send-cfg-ap 2 admin(stats)>...
  • Page 600 8-262 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(stats)> send-cfg-all Description: Copies the access point’s configuration to all of the access points within the known AP table. Syntax: send-cfg-all Copies the access point’s configuration to all of the access points within the known AP table.
  • Page 601 8-263 AP7131N>admin(stats)> clear Description: Clears the specified statistics counters to zero to begin new data calculations. Syntax: clear Clears WAN statistics counters. Clears LAN statistics counters for specified LAN index (either clear lan 1 or clear lan 2). all-rf Clears all RF data. all-wlan Clears all WLAN summary information.
  • Page 602 8-264 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(stats)> flash-all-leds Description: Starts and stops the illumination of a specified access point’s LEDs. Syntax: flash-all-leds <index> Defines the Known AP index number of the target AP to flash. <stop/start> Begins or terminates the flash activity.
  • Page 603 8-265 AP7131N>admin(stats)> echo Description: Defines the echo test values used to conduct a ping test to an associated MU. Syntax: show Shows the Mobile Unit Statistics Summary. list Defines echo test parameters and result. Determines echo test packet data. start Begins echoing the defined station.
  • Page 604 8-266 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin.stats.echo)> show Description: Shows Mobile Unit Statistics Summary. Syntax: show Shows Mobile Unit Statistics Summary. Example: admin(stats.echo)>show ---------------------------------------------------------------------------- IP Address MAC Address WLAN Radio T-put Retries ---------------------------------------------------------------------------- 192.168.2.0 00:A0F8:72:57:83 demo For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 605 8-267 AP7131N>admin.stats.echo)> list Description: Lists echo test parameters and results. Syntax: list Lists echo test parameters and results. Example: admin(stats.echo)>list Station Address : 00A0F8213434 Number of Pings : 10 Packet Length : 10 Packet Data (in HEX) : 55 admin(stats.echo)> For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 606 8-268 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin.stats.echo)>set Description: Defines the parameters of the echo test. Syntax: station <mac> Defines MU target MAC address. request <num> Sets number of echo packets to transmit (1-539). length <num> Determines echo packet length in bytes (1-539).
  • Page 607 8-269 AP7131N>admin.stats.echo)> start Description: Initiates the echo test. Syntax: start Initiates the echo test. Example: admin(stats.echo)>start admin(stats.echo)>list Station Address : 00A0F843AABB Number of Pings : 10 Packet Length : 100 Packet Data (in HEX) Number of MU Responses For information on MU Echo and Ping tests using the applet (GUI), see Pinging Individual MUs on page 7-30.
  • Page 608 8-270 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin(stats)> ping Description: Defines the ping test values used to conduct a ping test to an AP with the same ESSID. Syntax: ping show Shows Known AP Summary details. list Defines ping test packet length.
  • Page 609 8-271 AP7131N>admin.stats.ping)> show Description: Shows Known AP Summary Details. Syntax: show Shows Known AP Summary Details. Example: admin(stats.ping)>show ---------------------------------------------------------------------------- IP Address MAC Address KBIOS Unit Name ---------------------------------------------------------------------------- 192.168.2.0 00:A0F8:72:57:83 access point...
  • Page 610 8-272 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin.stats.ping)> list Description: Lists ping test parameters and results. Syntax: list Lists ping test parameters and results. Example: admin(stats.ping)>list Station Address : 00A0F8213434 Number of Pings : 10 Packet Length : 10 Packet Data (in HEX) : 55 admin(stats.ping)>...
  • Page 611 8-273 AP7131N>admin.stats.ping)> set Description: Defines the parameters of the ping test. Syntax: station Defines the AP target MAC address. request Sets number of ping packets to transmit (1-539). length Determines ping packet length in bytes (1-539). data Defines the particular packet data. Example: admin(stats.ping)>set station 00A0F843AABB admin(stats.ping)>set request 10...
  • Page 612 8-274 AP-7131N-FGR Access Point Product Reference Guide AP7131N>admin.stats.echo)> start Description: Initiates the ping test. Syntax: start Initiates the ping test. Example: admin(stats.ping)>start admin(stats.ping)>list Station Address : 00A0F843AABB Number of Pings : 10 Packet Length : 100 Packet Data (in HEX)
  • Page 613: Chapter 9. Configuring Mesh Networking

    Configuring Mesh Networking 9.1 Mesh Networking Overview The access point can be configured in two modes to support the new mesh networking functionality. The access point can be set to a client bridge mode and/or a base bridge mode (which accepts connections from client bridges).
  • Page 614 A mesh network must use one of the two access point LANs. If intending to use the access point for mesh networking support, Motorola recommends configuring at least one WLAN (of the 16 WLANs available) specifically for mesh networking support.
  • Page 615: The Client Bridge Association Process

    MU traffic with its associated devices. CAUTION Only Motorola model access points can be used as base bridges, client bridges or repeaters within an access point supported mesh network. If utilizing a mesh network, Motorola recommends considering a dual-radio model to optimize channel utilization and throughput.
  • Page 616: Client Bridge Configuration Process Example

    9.1.2 Spanning Tree Protocol (STP) The access point performs mesh networking using STP as defined in the 802.1d standard. NOTE The Motorola AP-4131 access point uses a non-standard form of 802.1d STP, and is therefore not compatible as a base bridge or client bridge within an access point managed network.
  • Page 617: Defining The Mesh Topology

    The user must be able to define one node as the root. Assigning a base bridge the lowest bridge priority defines it as the root. NOTE Motorola recommends using the Mesh STP Configuration screen to define a base bridge as a root.
  • Page 618: Normal Operation

    AP-7131N-FGR Access Point Product Reference Guide 9.1.5 Normal Operation Once the mesh network is defined, all normal access point operations are still allowed. MUs are still allowed to associate with the access point as usual. The user can create WLANs, security polices and VLANs as with any other access point.
  • Page 619 The user does not necessarily have to change these settings, as the default settings will work. However, Motorola encourages the user to define an access point as a base bridge and root (using the base bridge priority settings within the Bridge STP Configuration screen). Members of the mesh network can be configured as client bridges or additional base bridges with a higher priority value.
  • Page 620 (commonly referred to as the root). Motorola recommends assigning a Base Bridge AP with the lowest bridge priority so it becomes the root in the STP. If a root already exists, set the Bridge Priorities of new APs accordingly so the root of the STP doesn't get altered.
  • Page 621: Configuring A Wlan For Mesh Networking Support

    WLAN in order to share the same ESSID, radio designation, security policy, MU ACL and Quality of Service policy. If intending to use the access point for mesh networking support, Motorola recommends configuring at least one WLAN (of the 16 WLANs available) specifically for mesh networking support.
  • Page 622 WLAN that each access point will share when using this WLAN within their mesh network. Motorola recommends assigning a unique name to a WLAN supporting a mesh network to differentiate it from WLANs defined for non mesh support. The name assigned to the...
  • Page 623 A security policy for a mesh network should be configured carefully since the data protection requirements within a mesh network differ somewhat compared to a typical wireless LAN. Motorola discourages user-based authentication schemes such as 802.1x EAP, as this authentication scheme is not supported within a mesh network.
  • Page 624 9-12 AP-7131N-FGR Access Point Product Reference Guide encryption techniques available to the access point, see Enabling Authentication and Encryption Schemes on page 6-4. 8. ACL policies should be configured to allow or deny a range of MAC addresses from interoperating with the WLAN used with the mesh network. ACLs should be defined based on the client bridge and repeater (an access point defined as both a base and client bridge) association requirements within the mesh network.
  • Page 625: Configuring The Access Point Radio For Mesh Support

    If a hacker tries to find an ESSID via an MU, the access point’s ESSID does not display since the ESSID is not in the beacon. Motorola recommends keeping the option enabled to reduce the likelihood of hacking into the WLAN.
  • Page 626 AP-7131N-FGR Access Point Product Reference Guide To configure the access point radio for mesh networking support: NOTE The dual-radio model AP-7131N-FGR affords users better optimization of the mesh network feature by allowing the access point to transmit to other access points (in base or client bridge mode) using one independent radio and transmit with its associated devices using the second independent radio.
  • Page 627 Configuring Mesh Networking 9-15 NOTE With this 4.0 release of the access point firmware, a new scheme for radio configuration and WIPS server management has been implemented within the Quick Setup GUI applet. Up to eight radio buttons are now available (depending on the number radios supported by the SKU).
  • Page 628 WLAN (ESS) the client bridge uses to establish a wireless link. The default setting, is (WLAN1). Motorola recommends creating (and naming) a WLAN specifically for mesh networking support to differentiate the Mesh supported WLAN from non-Mesh supported WLANs.
  • Page 629 NOTE Auto link selection is based on the RSSI and load. The client bridge will select the best available link when the Automatic Link Selection checkbox is selected. Motorola recommends you do not disable this option, as (when enabled) the access point will select the best base bridge for connection.
  • Page 630 9-18 AP-7131N-FGR Access Point Product Reference Guide However, if you know the MAC Address corresponding to that Base Bridge, you can add that to the Preferred List using the add button. 12. Highlight a MAC address from the Preferred Base Bridge List and click the button to assign that device’s MAC address a higher priority and a greater likelihood of joining the...
  • Page 631 Configuring Mesh Networking 9-19 Enabled If the mesh connection is down on one radio (radio 1), the other radio (radio 2) is brought down and stops beaconing after the timeout period (45 seconds). This allows the client bridge (radio 1) to roam without dropping the MU's associated to radio 2.
  • Page 632: Mesh Network Deployment - Quick Setup

    9-20 AP-7131N-FGR Access Point Product Reference Guide 9.3 Mesh Network Deployment - Quick Setup This section provides instructions on how to quickly setup and demonstrate mesh functionality using three access points. Two following two deployment scenarios will be addressed: • Scenario 1 - Two base bridges (redundant) and one client bridge •...
  • Page 633 Configuring Mesh Networking 9-21 NOTE Enable the LAN1 Interface of AP#1 as a DHCP Server if you intend to associate MUs and require them to obtain an IP address via DHCP. 2. Assign a Mesh STP Priority of 40000 to LAN1 Interface.
  • Page 634 9-22 AP-7131N-FGR Access Point Product Reference Guide 3. Define a mesh supported WLAN. 4. Enable base bridge functionality on the 802.11a/n radio (Radio 2).
  • Page 635 Configuring Mesh Networking 9-23 5. Define a channel of operation for the 802.11a/n radio.
  • Page 636 9-24 AP-7131N-FGR Access Point Product Reference Guide 6. If needed, create another WLAN mapped to the 802.11b/g/n radio if 802.11b/g/n support is required for MUs on that 802.11 band. 9.3.1.2 Configuring AP#2 AP#2 can be configured the same as AP#1 with the following exceptions: •...
  • Page 637 Configuring Mesh Networking 9-25 9.3.1.3 Configuring AP#3 To define the configuration for AP#3 (a client bridge connecting to both AP#1 and AP#2 simultaneously): 1. Provide a known IP address for the LAN1 interface. 2. Assign the maximum value (65535) for the Mesh STP Priority.
  • Page 638 9-26 AP-7131N-FGR Access Point Product Reference Guide 3. Create a mesh supported WLAN with the Enable Client Bridge Backhaul option selected. NOTE This WLAN should not be mapped to any radio. Therefore, leave both of the “Available On” radio options unselected.
  • Page 639: Configuring Ap#1

    Configuring Mesh Networking 9-27 9.3.1.4 Verifying Mesh Network Functionality for Scenario #1 You now have a three AP mesh network ready to demonstrate. Associate a single MU on each AP WLAN configured for 802.11b/g/n radio support. Once completed, pass traffic among the three APs comprising the mesh network.
  • Page 640 9-28 AP-7131N-FGR Access Point Product Reference Guide 9.3.2.2 Configuring AP#2 AP#2 requires the following modifications from AP#2 in the previous scenario to function in base bridge/client bridge repeater mode. 1. Enable client bridge backhaul on the mesh supported WLAN.
  • Page 641: Configuring Ap#3

    Configuring Mesh Networking 9-29 2. Enable client and base bridge functionality on the 802.11a/n radio 9.3.2.3 Configuring AP#3 To define AP #3’s configuration: 1. The only change needed on AP#3 (with respect to the configuration used in scenario #1), is to disable the Auto Link Selection option.
  • Page 642 9-30 AP-7131N-FGR Access Point Product Reference Guide 2. Add the 802.11a/n Radio MAC Address. In scenario #2, the mesh WLAN is mapped to BSS1 on the 802.11a/n radio if each AP. The Radio MAC Address (the BSSID#1 MAC Address) is used for the AP#2 Preferred Base Bridge List.
  • Page 643: Verifying Mesh Network Functionality For Scenario #2

    Configuring Mesh Networking 9-31 9.3.2.4 Verifying Mesh Network Functionality for Scenario #2 You now have a three AP demo multi-hop mesh network ready to demonstrate. Associate an MU on the WLANs configured on the 802.11b/g/n radio for each AP and pass traffic among the members of the mesh network.
  • Page 644: Mesh Networking Frequently Asked Questions

    9-32 AP-7131N-FGR Access Point Product Reference Guide 9.4 Mesh Networking Frequently Asked Questions The following scenarios represent issues that could be encountered and resolved when defining an access point supported mesh configuration: Mesh Deployment Issue 1 - Client Bridge can only connect to one of two Base...
  • Page 645 Can I use secure beacons on the mesh backhaul supported WLAN? Resolution Yes, you can enable a secure beacon on a mesh backhaul supported WLAN. In fact, it is a Motorola recommended practice. Mesh Deployment Issue 6 - Is my mesh topology complete?
  • Page 646 Mesh Deployment Issue 9 - Can I mesh between and an access point and an AP300? Can I mesh between an AP-7131N-FGR and a AP300 model access port? Resolution No, an AP300 does not support mesh networking.
  • Page 647 Configuring Mesh Networking 9-35 Resolution That is expected behavior, when you make a configuration change on a mesh supported AP, it brings the radio driver down and then back up again. Consequently, the AP needs to re-establish its mesh connection after saving the configuration. Mesh Deployment Issue 14 - Will an existing client bridge see a new base bridge or repeater? If I add a new base bridge or repeater to an existing mesh topology, will my current client bridges see...
  • Page 648 9-36 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 649: Chapter 10. Adaptive Ap

    An adaptive AP (AAP) is an access point that can adopt like an AP300 (L3) access port. The management of an AAP is conducted by the switch, once the access point connects to a Motorola WS5100, RFS6000 or RFS7000 model switch and receives its AAP configuration.
  • Page 650: Where To Go From Here

    10-2 AP-7131N-FGR Access Point Product Reference Guide The benefits of an AAP deployment include: • Centralized Configuration Management & Compliance - Wireless configurations across distributed sites can be centrally managed by the wireless switch or cluster. • WAN Survivability - Local WLAN services at a remote sites are unaffected in the case of a WAN outage.
  • Page 651: Adaptive Ap Management

    Adaptive AP 10-3 10.1.2 Adaptive AP Management An AAP can be adopted, configured and managed like a thin access port from the wireless switch. NOTE To support AAP functionality, a WS5100 model switch must be running firmware version 3.1 or higher, whereas a RFS6000 or RFS7000 model switch must be running firmware version 1.1 or higher.
  • Page 652: Auto Discovery Using Dhcp

    1 = auto discovery enable 2 = auto discover enabled (using IPSec) ** The AP-7131N-FGR uses an encryption key to hash passphrases and security keys. To obtain the passphrase, configure an access point with the passphrase and export the configuration file.
  • Page 653: Manual Adoption Configuration

    Adaptive AP 10-5 10.1.4.2 Manual Adoption Configuration A manual switch adoption of an AAP can be conducted using: • Static FQDN - A switch fully qualified domain name can be specified to perform a DNS lookup and switch discovery. • Static IP addresses - Up to 12 switch IP addresses can be manually specified in an ordered list the AP can choose from.
  • Page 654: Configuration Updates

    10-6 AP-7131N-FGR Access Point Product Reference Guide 10.1.7 Configuration Updates An AAP receives its configuration from the switch initially as part of its adoption sequence. Subsequent configuration changes on the switch are reflected on an AAP when applicable. An AAP applies the configuration changes it receives from the switch after 30 seconds from the last received switch configuration message.
  • Page 655: Remote Site Survivability (Rss)

    Adaptive AP 10-7 10.1.10 Remote Site Survivability (RSS) RSS can be used to turn off RF activity on an AAP if it loses adoption (connection) to the switch. RSS State Independent WLANs Extended WLANs RSS Enabled WLAN continues beaconing WLAN continues beaconing but AP does allow clients to associate on that WLAN RSS Disabled WLAN stops beaconing...
  • Page 656: Supported Adaptive Ap Topologies

    LAN1. If the WAN Interface is used, explicitly configure WAN as the default gateway interface. • Motorola recommends using the LAN1 interface for adoption in multi-cell deployments. • If you have multiple independent WLANs mapped to different VLANs, the AAP's LAN1 interface requires trunking be enabled with the correct management and native VLAN IDs configured.
  • Page 657: Extended Wlans Only

    Adaptive AP 10-9 10.2.2 Extended WLANs Only An extended WLAN configuration forces all MU traffic through the switch. No wireless traffic is locally bridged by the AAP. Each extended WLAN is mapped to the access point's virtual LAN2 subnet. By default, the access point's LAN2 is not enabled and the default configuration is set to static with IP addresses defined as all zeros.
  • Page 658: Extended Wlan With Mesh Networking

    Converting an access point into an AAP requires: • A version 2.0 or higher firmware running on the access point. • A Motorola WS5100 (running firmware version 3.1 or later) or a RFS6000/RFS7000 (running firmware version 1.1 or later) model switch.
  • Page 659 Adaptive AP Configuration on page 10-12. Configuring the Switch for Adaptive AP Adoption The tasks described below are configured on a Motorola WS5100, RFS6000 or RFS7000 model switch. For information on configuring the switch for AAP support, see http://support.symbol.com/support/product/manuals.do. To adopt an AAP on a switch: 1.
  • Page 660: Establishing Basic Adaptive Ap Connectivity

    10-12 AP-7131N-FGR Access Point Product Reference Guide 10.4 Establishing Basic Adaptive AP Connectivity This section defines the activities required to configure basic AAP connectivity with a WS5100, RFS6000 or RFS7000 model switch. In establishing a basic AAP connection, both the access point and switch require modifications to their respective default configurations.
  • Page 661 Adaptive AP 10-13 2. Select the Auto Discovery Enable checkbox. Enabling auto discovery will allow the AAP to be detected by a switch once its connectivity medium has been configured (by completing steps 3-6) 3. Enter up to 12 Switch IP Addresses constituting the target switches available for AAP connection.
  • Page 662: Adopting An Adaptive Ap Using A Configuration File

    10-14 AP-7131N-FGR Access Point Product Reference Guide 7. Click Apply to save the changes to the AAP setup. NOTE The manual AAP adoption described above can also be conducted using the access point’s CLI interface using the admin(system.aapsetup)> command. 10.4.1.2 Adopting an Adaptive AP Using a Configuration File To adopt an AAP using a configuration file: 1.
  • Page 663: Switch Configuration

    Adaptive AP 10-15 10.4.2 Switch Configuration Both a WS5100 (running firmware version 3.1 or later) or a RFS6000/ RFS7000 (running firmware version 1.1 or later) require an explicit adaptive configuration to adopt an access point (if IPSec is not being used for adoption). The same licenses currently used for AP300 adoption can be used for an AAP.
  • Page 664 10-16 AP-7131N-FGR Access Point Product Reference Guide 5. Select the target WLAN you would like to use for AAP support from those displayed and click Edit button. 6. Select the Independent Mode (AAP Only) checkbox. Selecting the checkbox designates the WLAN as independent and prevents traffic from being forwarded to the switch.
  • Page 665 Adaptive AP 10-17 Once an AAP is adopted by the switch, it displays within the switch Access Port Radios screen (under the Network parent menu item) as an access point within the AP Type column.
  • Page 666: Adaptive Ap Deployment Considerations

    10-18 AP-7131N-FGR Access Point Product Reference Guide 10.4.3 Adaptive AP Deployment Considerations Before deploying your switch/AAP configuration, refer to the following usage caveats to optimize its effectiveness: • Extended WLANs are mapped to the AP’s LAN2 interface and all independent WLANs are mapped to the AP’s LAN1 Interface.
  • Page 667: Sample Switch Configuration File For Ipsec And Independent Wlan

    Adaptive AP 10-19 10.4.4 Sample Switch Configuration File for IPSec and Independent WLAN The following constitutes a sample RFS7000 switch configuration file supporting an AAP IPSec with Independent WLAN configuration. Please note new AAP specific CLI commands in and relevant comments in blue.
  • Page 668 10-20 AP-7131N-FGR Access Point Product Reference Guide snmp-server manager v2 snmp-server manager v3 snmp-server user snmptrap v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b snmp-server user snmpmanager v3 encrypted auth md5 0x7be2cb56f6060226f15974c936e2739b snmp-server user snmpoperator v3 encrypted auth md5 0x49c451c7c6893ffcede0491bbd0a12c4 To configure the passkey for a Remote VPN Peer - 255.255.255.255 denotes all AAPs. 12345678 is the default passkey.
  • Page 669 Adaptive AP 10-21 wlan 4 ssid qs5-open wlan 4 vlan 230 wlan 5 enable wlan 5 ssid Mesh wlan 5 vlan 111 wlan 5 encryption-type ccmp wlan 5 dot11i phrase 0 Symbol123 To configure a WLAN as an independent WLAN wlan 5 independent wlan 5 client-bridge-backhaul enable wlan 6 enable...
  • Page 670 10-22 AP-7131N-FGR Access Point Product Reference Guide radio 4 channel-power indoor 48 4 radio 4 rss enable radio 4 client-bridge bridge-select-mode auto radio 4 client-bridge ssid Mesh radio 4 client-bridge mesh-timeout 0 radio 4 client-bridge enable radio default-11a rss enable...
  • Page 671 Adaptive AP 10-23 interface ge3 switchport mode trunk switchport trunk native vlan 1 switchport trunk allowed vlan none switchport trunk allowed vlan add 1-9,100,110,120,130,140,150,160,170, switchport trunk allowed vlan add 180,190,200,210,220,230,240,250, static-channel-group 1 interface ge4 switchport access vlan 1 interface me1 ip address dhcp interface sa1 switchport mode trunk...
  • Page 672 10-24 AP-7131N-FGR Access Point Product Reference Guide line con 0 line vty 0 24...
  • Page 673: Appendix A. Technical Specifications

    Technical Specifications This appendix provides technical specifications for the following: • Physical Characteristics • Electrical Characteristics • Radio Characteristics • Country Codes...
  • Page 674 AP-7131N-FGR Access Point Product Reference Guide A.1 Physical Characteristics An AP-7131N-FGR model access point has the following physical characteristics: Dimensions 5.50 in. Depth x 7.88 in. Width x 1.38 in. Height 14 cm Depth x 20.32 cm Width x 3.5 cm Height...
  • Page 675: Radio Characteristics

    Technical Specifications A.3 Radio Characteristics An AP-7131N-FGR has the following radio characteristics: Operating Channels All channels from 4920 MHz to 5825 MHz except channel 52 -64 Channels 1-13 (EU), Channels 1-11 (US/Canada) Channel 14 (2484 MHz) Japan only Actual operating frequencies depend on regulatory Data Rates Supported 802.11g: 1,2,5.5,11,6,9,12,18,24,36,48, and 54Mbps...
  • Page 676: Country Codes

    AP-7131N-FGR Access Point Product Reference Guide A.4 Country Codes The following list of countries and their country codes is useful when using the AP-7131N-FGR configuration file, CLI or the MIB to configure the access point: Country Code Country Code Argentina...
  • Page 677 Technical Specifications Country Code Country Code Cypress Russia Czech Rep. Saudi Arabia Denmark Serbia Dominican Republic Singapore Ecuador Slovak Republic Egypt Slovenia El Salvador South Africa Estonia South Korea Falkland Islands Spain Finland Sri Lanka France Sweden French Guiana Switzerland Germany Taiwan Greece...
  • Page 678 AP-7131N-FGR Access Point Product Reference Guide Country Code Country Code Italy Jamaica Japan Jordan Kazakhstan Kuwait Latvia Lebanon Liechtenstein Lithuania Luxembourg Macedonia Malaysia Malta Martinique...
  • Page 679: Appendix B. Usage Scenarios

    Usage Scenarios This appendix provides practical usage scenarios for many of the access point’s key features. This information should be referenced as a supplement to the information contained within this Product Reference Guide. The following scenarios are described: • Configuring Automatic Updates using a DHCP or Linux BootP Server •...
  • Page 680: Windows - Dhcp Server Configuration

    AP-7131N-FGR Access Point Product Reference Guide WAN port depending on which server responds first to the access point’s request for an automatic update. The firmware is automatically updated each time firmware versions are found to be different between what is running on the access point and the firmware file that resides on the server. The...
  • Page 681: Global Options - Using Extended/Standard Options

    Usage Scenarios 1. Set the Windows DHCP Server and access point on the same Ethernet segment. 2. Configure the Windows based DHCP Server as follows: a. Highlight the Server Domain Name (for example, apfw.motorola.com). From the Action menu, select Define Vendor Classes.
  • Page 682 To configure Global options using extended/standard options: 1. Set the Windows DHCP Server and access point on the same Ethernet segment. 2. Configure the Windows based DHCP Server as follows: a. Highlight the Server Domain Name (for example, apfw.motorola.com). From the Action menu, select Set Predefined Options.
  • Page 683: Dhcp Priorities

    Usage Scenarios By default, auto update is enabled on the access point (since the LAN Port is a DHCP Client, out-of-the-box auto update support is on the LAN Port). 4. Restart the access point. 5. While the access point boots up, verify the access point: •...
  • Page 684: Linux - Bootp Server Configuration

    AP-7131N-FGR Access Point Product Reference Guide -------------------------------------------------------------------------------------------- If the DHCP Server is configured for options 186 and 66 (to assign SFTP Server IP addresses) the access point uses the IP address configured for option 186. Similarly, if the DHCP Server is configured for options 187 and 67 (for the firmware file) the access point uses the file name configured for option 187.
  • Page 685 This section contains instructions for the automatic update of the access point firmware and configuration file using a BootP Server. The setup example described in this section includes: • 1 AP-7131N-FGR access point • 1 Linux/Unix BOOTP Server • 1 SFTP Server.
  • Page 686 AP-7131N-FGR Access Point Product Reference Guide Using options sa, bf and 136: AP-7131:ha=00a0f88aa6d8\ < LAN M AC Address> :sm =255.255.255.0\ <Subnet M ask> :ip=157.235.93.128\ <IP A ddress> :gw =157.235.93.2\ <gatew ay> :sa=157.235.93.250\ <TFTP Server IP> :bf=/tftpboot/cfg.txt\ <Configuration file> :T136=”/tftpboot/”: <TFTP root directory>...
  • Page 687: Bootp Priorities

    Usage Scenarios NOTE If the firmware files are the same, the firmware will not get updated. If the configuration file name matches the last used configuration file on the access point or if the configuration file versions are the same, the access point configuration will not get updated.
  • Page 688: Configuring An Ipsec Tunnel And Vpn Faqs

    B-10 AP-7131N-FGR Access Point Product Reference Guide B.2 Configuring an IPSEC Tunnel and VPN FAQs The access point has the capability to create a tunnel between an access point and a VPN endpoint. The access point can also create a tunnel from one access point to another access point.
  • Page 689 Usage Scenarios B-11 5. Enter the WAN port IP address of AP #1 for the Local WAN 6. Within the Remote Subnet Remote Subnet Mask fields, enter the LAN IP subnet and mask of AP #2 /Device #2. 7. Enter the WAN port IP address of AP #2/ Device #2 for a Remote Gateway.
  • Page 690 B-12 AP-7131N-FGR Access Point Product Reference Guide 11. For the ESP Type, select ESP with Authentication and use AES 128-bit as the ESP encryption algorithm and as the ESP authentication algorithm. Click OK. 12. Select the IKE Settings button. 13. Select Pre Shared Key (PSK) from the IKE Authentication Mode drop-down menu.
  • Page 691: Configuring A Cisco Vpn Device

    Usage Scenarios B-13 14. Enter a Passphrase. Passphrases must match on both VPN devices. NOTE Ensure the IKE authentication Passphrase is the same as the Pre-shared key on the Cisco PIX device. 15. Select AES 128-bit as the IKE Encryption Algorithm. 16.
  • Page 692 B-14 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 693: Frequently Asked Vpn Questions

    The VPN tunnel can be established only when these corresponding keys match. Ensure the Inbound/Outbound SPI and ESP Authentication Keys have been properly specified. • Question 5: Can a tunnel between an AP-7131N-FGR and WS2000 be established? Yes.
  • Page 694 B-16 AP-7131N-FGR Access Point Product Reference Guide • Question 6: Can an IPSec tunnel over a PPPoE connection be established - such as a PPPoE enabled DSL link? Yes. The access point supports tunneling when using a PPPoE username and password.
  • Page 695 Usage Scenarios B-17 • Question 9: I am using a direct cable connection between my two VPN gateways for testing and cannot get a tunnel established, yet it works when I set them up across another network or router. Why? The packet processing architecture of the access point VPN solution requires the WAN default gateway to work properly.
  • Page 696 B-18 AP-7131N-FGR Access Point Product Reference Guide Try the following troubleshooting tips: • Verify you can ping each of the remote Gateway IP addresses from clients on either side. Failed pings can indicate general network connection problems. • Pinging the internal gateway address of the remote subnet should run the ping through the tunnel as well.
  • Page 697 Usage Scenarios B-19 <Remote Subnet IP range> <WAN IP address> Transport Scr port 1:65535 Dst port Rev NAT None These three rules should be configured above all other rules (default or user defined). When Advanced LAN Access is used, certain inbound/outbound rules need to be configured to control incoming/outgoing packet flow for IPSec to work properly (with Advanced LAN Access).
  • Page 698 B-20 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 699: Appendix C. Customer Support

    Support Central provides our customers with a wealth of information and online assistance including developer tools, software downloads, product manuals and online repair requests. When contacting the Motorola Support Center, please provide the following information: • serial number of unit • model number or product name...
  • Page 700 AP-7131N-FGR Access Point Product Reference Guide North American Contacts Support (for warranty and service information): telephone: 1-800-653-5350 fax: (631) 738-5410 Email: emb.support@motorola.com International Contacts Outside North America: Motorola, inc. Symbol Place Winnersh Triangle, Berkshire, RG41 5TP United Kingdom 0800-328-2424 (Inside UK)
  • Page 701 Customer Support Web Support Sites Product Downloads http://support.symbol.com/support/product/softwaredownloads.do Manuals https://support.symbol.com/support/product/FIPS_and_CC_Compliant_Products.html Additional Information Obtain additional information by contacting Motorola at: 1-800-722-6234, inside North America +1-516-738-5200, in/outside North America http://www.motorola.com/...
  • Page 702 AP-7131N-FGR Access Point Product Reference Guide...
  • Page 703: Index

    ......1-10 AP-7131N-FGR access ......4-15 CA certificate .
  • Page 704 IN-6 AP-7131N-FGR Access Point Product Reference Guide CLI, network LAN commands ....8-12 CLI, network LAN, DHCP commands ....8-28 EAP .
  • Page 705 IN-7 mesh networking dual-radio AP-5131 ......9-3 QoS support ....... . . 1-11 STP .
  • Page 706 IN-8 AP-7131N-FGR Access Point Product Reference Guide statistics, WAN....... . 7-2 VLAN, native tag .
  • Page 708 MOTOROLA INC. 1303 E. ALGONQUIN ROAD SCHAUMBURG, IL 60196 http://www.motorola.com 72E-126727-01 Revision A September 2009...

Table of Contents