Smc-networks SMC2555W-AG User Manual

Browse online or download User Manual for Hardware Smc-networks SMC2555W-AG. SMC Networks SMC2555W-AG User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 256
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 2

COMPLIANCESviEuropean Community country. The presence of nearby radar operation may result in temporary interruption of operation of this device. The

Page 3 - User Guide

System Configuration5-44Radio Settings (802.11g)The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because th

Page 4 - Copyright

Radio Interface5-45access points at least five channels apart to avoid interference with each other. For example, in the United States you can deploy

Page 5 - LIMITED WARRANTY

System Configuration5-46CLI Commands for the 802.11a Wireless Interface – From the global configuration mode, enter the interface wireless g command t

Page 6

Radio Interface5-47SMC-AP#show interface wireless g 6-95Wireless Interface Information===========================================================-----

Page 7

System Configuration5-48SecurityThe SMC2555W-AG is configured by default as an “open system,” which broadcasts a beacon signal including the configure

Page 8 - Japan VCCI Class B

Radio Interface5-49The security mechanisms that may be employed depend on the level of security required, the network and management resources availab

Page 9 - EC Conformance Declaration

System Configuration5-50Wired Equivalent Privacy (WEP) WEP provides a basic level of security, preventing unauthorized access to the network and encry

Page 10 - COMPLIANCES

Radio Interface5-51Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized acc

Page 11 - Community

System Configuration5-52Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported

Page 12

Radio Interface5-53encryption command to enable WEP encryption. Use the multicast-cipher command to select WEP cipher type. To enter WEP keys, use the

Page 13 - Safety Compliance

COMPLIANCESviiOperation Using 5 GHz Channels in the European CommunityThe user/installer must use the provided configuration utility to check the curr

Page 14

System Configuration5-54Note: The index and length values used in the key command must be the same values used in the encryption and transmit-key comm

Page 15 - OMPLIANCES

Radio Interface5-55Wi-Fi Protected Access (WPA)WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 w

Page 16

System Configuration5-56Note: To implement WPA on wireless clients requires a WPA-enabled network card driver and 802.1x client software that supports

Page 17

Radio Interface5-57multicast and broadcast traffic must be the same for all clients, therefore it restricts encryption to a WEP key. When access is op

Page 18

System Configuration5-58WPA Key Management – WPA can be configured to work in an enterprise environment using IEEE 802.1x and a RADIUS server for user

Page 19

Radio Interface5-59WPA Pre-Shared Key Type – If the WPA pre-shared-key mode is used, all wireless clients must be configured with the same key to comm

Page 20

System Configuration5-60authentication. To view the current 802.11g security settings, use the show interface wireless a or show interface wireless g

Page 21

Status Information5-61Status InformationThe Status page includes information on the following items:Access Point StatusThe AP Status window displays b

Page 22 - Appendices

System Configuration5-62AP System Configuration – The AP System Configuration table displays the basic system configuration settings:• System Up Time:

Page 23 - Introduction

Status Information5-63CLI Commands for Displaying System Settings – To view the current access point system settings, use the show system command from

Page 24 - Package Checklist

COMPLIANCESviiiDeclaration of Conformity in Languages of the European CommunityEnglish Hereby, SMC Networks, declares that this Radio LAN device is in

Page 25 - Hardware Description

System Configuration5-64Station StatusThe Station Status window shows the wireless clients currently associated with the SMC2555W-AG.The Station Confi

Page 26 - Component Description

Status Information5-65completed, stations can associate with the current access point, or reassociate with a new access point. The association procedu

Page 27

System Configuration5-66Event LogsThe Event Logs window shows the log messages generated by the access point and stored in memory.The Event Logs table

Page 28

Status Information5-67• WEP keys do not match: When the access point uses “Shared Key Authentication,” but the key used by client and access point are

Page 29 - Features and Benefits

System Configuration5-68

Page 30 - Applications

6-1Chapter 6Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the SMC2555W-AG over a

Page 31 - System Defaults

Command Line Interface6-2After connecting to the system through the console port, the login screen displays:Note: Command examples shown later in this

Page 32

Entering Commands6-3After you configure the access point with an IP address, you can open a Telnet session by performing these steps.1. From the remot

Page 33

Command Line Interface6-4You can enter commands as follows:• To enter a simple command, enter the command keyword. • To enter commands that require pa

Page 34

Entering Commands6-5list of valid keywords for a specific command. For example, the command “show ?” displays a list of possible show commands:The com

Page 35

COMPLIANCESixSafety ComplianceUnderwriters Laboratories Compliance StatementImportant! Before making connections, make sure you have the correct cord

Page 36

Command Line Interface6-6Negating the Effect of CommandsFor many configuration commands you can enter the prefix keyword “no” to cancel the effect of

Page 37 - Hardware Installation

Entering Commands6-7Exec CommandsWhen you open a new console session on the access point, the system enters Exec command mode. Only a limited number o

Page 38

Command Line Interface6-8To enter the Global Configuration mode, enter the command configure in Exec mode. The system prompt will change to “SMC Enter

Page 39

Entering Commands6-9Ctrl-N Enters the next command line in the history buffer.Ctrl-P Shows the last command.Ctrl-R Repeats current command line on a n

Page 40

Command Line Interface6-10Command GroupsThe system commands can be broken down into the functional groups shown below.The access mode shown in the fol

Page 41 - Network Configuration

General Commands6-11General CommandsconfigureThis command activates Global Configuration mode. You must enter this mode to modify most of the settings

Page 42 - Network Topologies

Command Line Interface6-12endThis command returns to the previous configuration mode.Default Setting NoneCommand Mode Global Configuration, Interface

Page 43 - Infrastructure Wireless LAN

General Commands6-13pingThis command sends ICMP echo request packets to another node on the network.Syntax ping <host_name | ip_address> • host_

Page 44

Command Line Interface6-14resetThis command restarts the system or restores the factory default settings.Syntax reset <board | configuration> •

Page 45

General Commands6-15Command Usage • The history buffer size is fixed at 10 commands.• Use the up or down arrow keys to scroll through the commands in

Page 46

COMPLIANCESxWichtige Sicherheitshinweise (Germany)1. Bitte lesen Sie diese Hinweise sorgfältig durch.2. Heben Sie diese Anleitung für den späteren G

Page 47 - Initial Configuration

Command Line Interface6-16System Management CommandsThese commands are used to configure the user name, password, system logs, browser management opti

Page 48

System Management Commands6-17logging console Initiates logging of error messages to the consoleGC 6-25logging level Defines the minimum severity leve

Page 49 - Initial Configuration Steps

Command Line Interface6-18countryThis command configures the access point’s country code, which identifies the country of operation and sets the autho

Page 50 - Setup Wizard

System Management Commands6-19Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand M

Page 51

Command Line Interface6-20promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstr

Page 52

System Management Commands6-21Command Mode Global ConfigurationExample usernameThis command configures the user name for management access.Syntax user

Page 53

Command Line Interface6-22passwordAfter initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the

Page 54

System Management Commands6-23Command Mode Global ConfigurationExampleRelated Commandsip http server (page 6-23)ip http serverThis command allows this

Page 55 - 192.168.2.2

Command Line Interface6-24logging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disa

Page 56

System Management Commands6-25Default Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of error mess

Page 57 - Chapter 5

COMPLIANCESxiAC 7,5-8V, 50-60Hz nicht über oder unterschreiten sowie den minimalen Strom von 1A nicht unterschreiten.Der arbeitsplatzbezogene Schalldr

Page 58 - Advanced Configuration

Command Line Interface6-26logging levelThis command sets the minimum severity level for event logging.Syntaxlogging level <Alert | Critical | Error

Page 59

System Management Commands6-27logging facility-typeThis command sets the facility type for remote logging of syslog messages.Syntaxlogging facility-ty

Page 60 - System Identification

Command Line Interface6-28Examplesntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this co

Page 61

System Management Commands6-29Command Usage When SNTP client mode is enabled using the sntp-server enable command, the sntp-server ip command specifie

Page 62 - TCP / IP Settings

Command Line Interface6-30Example Related Commandssntp-server ip (page 6-28)show sntp (page 6-32)sntp-server date-timeThis command sets the system clo

Page 63

System Management Commands6-31sntp-server daylight-savingThis command sets the start and end dates for daylight savings time. Use the no form to disab

Page 64

Command Line Interface6-32sntp-server timezoneThis command sets the time zone for the access point’s internal clock.Syntaxsntp-server timezone <hou

Page 65

System Management Commands6-33Example show systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecSMC-AP#

Page 66

Command Line Interface6-34Exampleshow versionThis command displays the software version for the system.Default SettingNoneCommand Mode ExecExample SMC

Page 67

SNMP Commands6-35SNMP CommandsControls access to this access point from management stations using the Simple Network Management Protocol (SNMP), as we

Page 69

Command Line Interface6-36• ro - Specifies read-only access. Authorized management stations are only able to retrieve MIB objects. • rw - Specifies re

Page 70

SNMP Commands6-37Command Mode Global ConfigurationExample Related Commandssnmp-server location (page 6-39)snmp-server enable serverThis command enable

Page 71

Command Line Interface6-38Related Commandssnmp-server host (page 6-38)snmp-server host This command specifies the recipient of an SNMP notification. U

Page 72

SNMP Commands6-39Example Related Commandssnmp-server enable server (page 6-37)snmp-server locationThis command sets the system location string. Use th

Page 73

Command Line Interface6-40show snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleFlash/File CommandsThese commands are

Page 74

Flash/File Commands6-41bootfileThis command specifies the image used to start up the system.Syntaxbootfile <filename>filename - Name of the imag

Page 75 - Filter Control

Command Line Interface6-42copy This command copies a boot file, code image, or configuration file between the access point’s flash memory and a FTP/TF

Page 76

Flash/File Commands6-43server is 255 characters or 32 characters for files on the access point. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)• Due

Page 77

Command Line Interface6-44Command Mode ExecCaution: Beware of deleting application images from flash memory. At least one application image is require

Page 78

RADIUS Client6-45Example The following example shows how to display all file information:RADIUS ClientRemote Authentication Dial-in User Service (RADI

Page 79

xiiiTABLE OF CONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Package Checklist . . . . . . . . . . . . . . . .

Page 80

Command Line Interface6-46radius-server addressThis command specifies the primary and secondary RADIUS servers. Syntaxradius-server address [secondary

Page 81

RADIUS Client6-47Example radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string>• second

Page 82

Command Line Interface6-48Default Setting 3Command Mode Global ConfigurationExample radius-server timeoutThis command sets the interval between transm

Page 83 - Administration

RADIUS Client6-49show radiusThis command displays the current settings for the RADIUS server.Default SettingNoneCommand Mode ExecExample SMC-AP#show r

Page 84

Command Line Interface6-50802.1x Port AuthenticationThe access point supports IEEE 802.1x access control for wireless clients. This control feature pr

Page 85

802.1x Port Authentication6-51802.1xThis command configures 802.1x as optionally supported or as required for wireless clients. Use the no form to dis

Page 86

Command Line Interface6-52initiate 802.1x authentication). For stations initiating 802.1x, only those stations successfully authenticated are allowed

Page 87

802.1x Port Authentication6-53broadcast-key-refresh-rate command specifies the interval after which the broadcast keys are changed. The 802.1x session

Page 88

Command Line Interface6-54802.1x session-timeoutThis command sets the time period after which a connected client must be re-authenticated. Use the no

Page 89 - System Log

802.1x Port Authentication6-55Command ModeGlobal ConfigurationExampleRelated Commandsaddress filter entry (page 6-55)show authentication (page 6-59)ad

Page 90

TABLE OF CONTENTSxivStation Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-64Event Logs . . . . . . . . . . . . . . . . . .

Page 91

Command Line Interface6-56ExampleRelated Commandsaddress filter default (page 6-54)show authentication (page 6-59)address filter deleteThis command de

Page 92

802.1x Port Authentication6-57mac-authentication serverThis command sets address filtering to be performed with local or remote options. Use the no fo

Page 93

Command Line Interface6-58mac-authentication session-timeoutThis command sets the interval at which associated clients will be re-authenticated with t

Page 94

802.1x Port Authentication6-59show authenticationThis command shows all 802.1x authentication settings, as well as the address filter table.Command Mo

Page 95 - Radio Settings (802.11a)

Command Line Interface6-60Filtering CommandsThe commands described in this section are used to filter communications between wireless clients, control

Page 96

Filtering Commands6-61Command UsageThis command can disable wireless-to-wireless communications between clients via the access point. However, it does

Page 97

Command Line Interface6-62filter ethernet-type enableThis command checks the Ethernet type on all incoming and outgoing Ethernet packets against the p

Page 98

Filtering Commands6-63filter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable filtering for a

Page 99

Command Line Interface6-64show filtersThis command shows the filter options and protocol entries in the filter table. Command ModeExecExampleInterface

Page 100 - Radio Settings (802.11g)

Interface Commands6-65Ethernet Interfacedns primary-server Specifies the primary name serverIC-E 6-68dns secondary-server Specifies the secondary na

Page 101 - Radio Interface

TABLE OF CONTENTSxvlogging host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24logging console . . . . . . . . . . . . . . . .

Page 102

Command Line Interface6-66ssid Configures the service set identifierIC-W 6-79beacon-interval Configures the rate at which beacon signals are transmi

Page 103

Interface Commands6-67transmit-power Adjusts the power of the radio signals transmitted from the access pointIC-W 6-87max-association Configures the

Page 104 - Security

Command Line Interface6-68interfaceThis command configures an interface type and enters interface configuration mode. Syntaxinterface <ethernet | w

Page 105

Interface Commands6-69Default Setting NoneCommand Mode Global ConfigurationCommand Usage The primary and secondary name servers are queried in sequenc

Page 106

Command Line Interface6-70Default Setting IP address: 192.168.2.2Netmask: 255.255.255.0Command Mode Interface Configuration (Ethernet)Command Usage •

Page 107

Interface Commands6-71ip dhcp This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP ad

Page 108

Command Line Interface6-72Related Commandsip address (page 6-69)shutdown This command disables the Ethernet interface. To restart a disabled interface

Page 109

Interface Commands6-73Default Setting Ethernet interfaceCommand Mode ExecExample radio-mode This command sets the working mode for the wireless interf

Page 110

Command Line Interface6-74Command Mode Interface Configuration (Wireless g)Exampleselect-antenna-mode This command selects the built-in antennas or an

Page 111

Interface Commands6-75description This command adds a description to a the wireless interface. Use the no form to remove the description.Syntaxdescrip

Page 113

TABLE OF CONTENTSxviaddress filter entry . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-55address filter delete . . . . . . . . . . . . .

Page 114

Command Line Interface6-76Command Usage When SSID broadcast is disabled, the access point will not include its SSID in beacon messages. Nor will it re

Page 115

Interface Commands6-77ExamplechannelThis command configures the radio channel through which the access point communicates with wireless clients. Synta

Page 116

Command Line Interface6-78• For most wireless adapters, the channel for wireless clients is automatically set to the same as that used by the access p

Page 117 - Status Information

Interface Commands6-79ssidThis command configures the service set identifier (SSID). Syntaxssid stringstring - The name of a basic service set support

Page 118

Command Line Interface6-80Command Mode Interface Configuration (Wireless)Command Usage The beacon signals allow wireless clients to maintain contact w

Page 119

Interface Commands6-81indicates that the access point will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after

Page 120 - Station Status

Command Line Interface6-82collisions due to high network utilization, try setting the fragment size to send smaller fragments. This will speed up the

Page 121

Interface Commands6-83RTS frame, the station sends a CTS frame to notify the sending station that it can start sending data. • Access points contendin

Page 122 - Event Logs

Command Line Interface6-84ExampleRelated Commandsencryption (page 6-84)key (page 6-85)encryption This command defines whether or not WEP encryption is

Page 123

Interface Commands6-85• Note that WEP protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network

Page 124

TABLE OF CONTENTSxviiwpa-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-92wpa-preshared-key . . . . . . . . . . . . . . .

Page 125 - Command Line Interface

Command Line Interface6-86Command Usage • To enable Wired Equivalent Privacy (WEP), use the authentication command to select the “shared key” authenti

Page 126 - Telnet Connection

Interface Commands6-87Command Mode Interface Configuration (Wireless)Command Usage • If you use WEP key encryption, the access point uses the transmit

Page 127 - Entering Commands

Command Line Interface6-88Command Usage • The “min” keyword indicates minimum power.• The longer the transmission distance, the higher the transmissio

Page 128 - Getting Help on Commands

Interface Commands6-89multicast-cipher This command defines the cipher algorithm used for broadcasting and multicasting when using Wi-Fi Protected Acc

Page 129 - Partial Keyword Lookup

Command Line Interface6-90• TKIP defends against attacks on WEP in which the unencrypted initialization vector in encrypted packets is used to calcula

Page 130 - Understanding Command Modes

Interface Commands6-91Command Usage Wi-Fi Protected Access (WPA) provides improved data encryption, which was weak in WEP, and user authentication, wh

Page 131 - Configuration Commands

Command Line Interface6-92wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is to use 802.1x dynamic keys or a pre-shared key.Synta

Page 132 - Command Line Processing

Interface Commands6-93wpa-preshared-key This command defines a Wi-Fi Protected Access (WPA) preshared-key.Syntaxwpa-preshared-key <type> <val

Page 133

Command Line Interface6-94wpa-psk-type This command defines the Wi-Fi Protected Access (WPA) preshared-key type.Syntaxwpa-psk-type <type>type -

Page 134 - Command Groups

Interface Commands6-95Example show interface wirelessThis command displays the status for the wireless interface.Syntaxshow interface wireless <a |

Page 135 - General Commands

TABLE OF CONTENTSxviiiAppendicesA Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . .A-1Maximum Distance Table . . . . . . . . . . .

Page 136

Command Line Interface6-96Example SMC-AP#show interface wireless gWireless Interface Information======================================================

Page 137

Interface Commands6-97show stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample SMC-AP#show statio

Page 138

Command Line Interface6-98IAPP CommandsThe command described in this section enables the protocol signaling required to ensure the successful handover

Page 139

VLAN Commands6-99VLAN CommandsThe access point can enable the support of VLAN-tagged traffic passing between wireless clients and the wired network. U

Page 140 - System Management Commands

Command Line Interface6-100vlanThis command enables VLANs for all traffic. Use the no form to disable VLANs.Syntaxvlan enable no vlanDefaultDisabledCo

Page 141

VLAN Commands6-101native-vlanid This command configures the native VLAN ID for the access point. Syntaxnative-vlanid <vlan-id>vlan-id - Native V

Page 142

Command Line Interface6-102

Page 143

A-1Appendix ATroubleshootingCheck the following items before you contact technical support.1. If wireless clients cannot access the network, check the

Page 144

TroubleshootingA-22. If the access point cannot be configured using Telnet, a web browser, or SNMP software:• Be sure to have configured the access po

Page 145

TroubleshootingA-34. If you forgot or lost the password:• Set the access point to its default configuration by pressing the reset button on the back p

Page 146

1-1Chapter 1IntroductionSMC’s EliteConnect Universal 2.4GHz/5GHz Wireless Access Point (SMC2555W-AG) is an IEEE 802.11a/g access point that provides t

Page 147

TroubleshootingA-4Maximum Distance TableImportant NoticeMaximum distances posted below are actual tested distance thresholds. However, there are many

Page 148

B-1Appendix BCables and PinoutsTwisted-Pair Cable Assignments Caution: DO NOT plug a phone jack connector into the RJ-45 port. Use only twisted-pair c

Page 149

Cables and PinoutsB-210/100BASE-TX Pin AssignmentsUse unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-oh

Page 150

Twisted-Pair Cable AssignmentsB-3Straight-Through WiringBecause the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “

Page 151

Cables and PinoutsB-4Console Port Pin AssignmentsThe DB-9 DCE serial port on the front panel of the SMC2555W-AG is used to connect to the access point

Page 152

Console Port Pin AssignmentsB-5Serial Cable Signal Directions for DB-9 PortsSerial Cable Signal Directions for DB-25 PortsDB-9 to DB-9 AP Terminal or

Page 153

Cables and PinoutsB-6

Page 154

C-1Appendix CSpecificationsGeneral SpecificationsMaximum Channels802.11a:US & Canada: 13 (normal mode), 5 (turbo mode)Japan: 4 (normal mode), 1 (t

Page 155

SpecificationsC-2Operating Frequency802.11a:5.15 ~ 5.25 GHz (lower band) US/Canada, Japan5.25 ~ 5.35 GHz (middle band) US/Canada5.725 ~ 5.825 GHz (upp

Page 156

General SpecificationsC-3Humidity15% to 95% (non-condensing)CompliancesIEC 61000-4-2/3/4/6/11EMC Compliance (Class B)FCC Class B (US)ICES-003 (Canada)

Page 157

Introduction1-2The access point also supports a 54 Mbps half-duplex connection to Ethernet networks for each active channel (up to 108 Mbps in turbo m

Page 158

SpecificationsC-4SensitivityIEEE 802.11a Sensitivity (GHz - dBm)Modulation/Rates 5.15-5.250 5.25-5.350 5.50-5.700 5.725-5.825BPSK (6 Mbps) -88 -88 -88

Page 159 - SNMP Commands

General SpecificationsC-5Transmit Power IEEE 802.11a Maximum Output Power (GHz - dBm)Data Rate 5.15-5.250 5.25-5.350 5.50-5.700 5.725-5.8256 Mbps 17 1

Page 160

SpecificationsC-6

Page 161

Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi

Page 162

GlossaryGlossary-2Backbone The core infrastructure of a network. The portion of the network that transports information from one central location to a

Page 163

GlossaryGlossary-3Extended Service Set (ESS)More than one wireless cell can be configured with the same Service Set Identifier to allow mobile users c

Page 164 - Flash/File Commands

GlossaryGlossary-4IEEE 802.11bA wireless standard that supports wireless communications in the 2.4 GHz band using Direct Sequence Spread Spectrum (DSS

Page 165

GlossaryGlossary-5Network Time Protocol (NTP)NTP provides the mechanisms to synchronize time across the network. The time servers operate in a hierarc

Page 166

GlossaryGlossary-6Problem.” If the packet size is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled.Service Set Id

Page 167

GlossaryGlossary-7Trivial File Transfer Protocol (TFTP)A TCP/IP protocol commonly used for software downloads.Virtual LAN (VLAN)A Virtual LAN is a col

Page 168

Hardware Description1-3Hardware DescriptionFront PanelRear PanelAntennasIndicator PanelSecurity SlotConsole PortRJ-45 Port,PoE ConnectorReset Button5

Page 169 - RADIUS Client

GlossaryGlossary-8

Page 170

Index-1AAdvanced Encryption Standard See AESAES 5-57antennas, positioning 2-2authentication 5-12, 6-83configuring 5-12, 6-83MAC address 5-13, 6-54, 6

Page 171

IndexIndex-2filter 5-19, 6-54address 5-12, 6-54between wireless clients 5-21, 6-60local bridge 5-21, 6-60local or remote 5-12, 6-57management access 5

Page 172

IndexIndex-3OOFDM 1-1open system 5-48operating frequency C-2Ppackage checklist 1-2passwordconfiguring 5-27, 6-22management 5-27, 6-22pin assignmentsco

Page 173

IndexIndex-4TTelnetfor managenet access 6-2Temporal Key Integrity Protocol See TKIPtime zone 5-36, 6-32TKIP 5-56, 6-89transmit power, configuring 5-4

Page 175

38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; Phn: (

Page 176

Introduction1-4Component DescriptionAntennasThe access point includes two antennas for wireless communications. The signal transmitted from both anten

Page 177

Hardware Description1-5Security SlotThe access point includes a Kensington security slot on the rear panel. You can prevent unauthorized removal of th

Page 178 - 802.1x session-timeout

Introduction1-6Console PortThis port is used to connect a console device to the access point through a serial cable. This connection is described unde

Page 179

Features and Benefits1-7changes you may have made are removed, and the factory default configuration is restored to the access point. Power ConnectorT

Page 180

38 TeslaIrvine, CA 92618Phone: (949) 679-8000EliteConnect™ Universal2.4GHz/5GHz Wireless Access PointUser GuideThe easy way to make all your network c

Page 181

Introduction1-8• Scans all available channels and selects the best channel for each client based on the signal-to-noise ratioApplicationsThe Wireless

Page 182

System Defaults1-9System DefaultsThe following table lists some of the access point’s basic system defaults. To reset the access point defaults, use t

Page 183

Introduction1-10MAC AuthenticationMAC Local MACAuthentication Session Timeout0 seconds (disabled)Local MAC System DefaultAllowedLocal MAC PermissionAl

Page 184 - Filtering Commands

System Defaults1-11System LoggingSyslog DisabledLogging Host DisabledLogging Console DisabledIP Address / Host Name0.0.0.0Logging Level InformationalL

Page 185

Introduction1-12Wireless Interface 802.11aIAPP EnabledSSID SMCStatus EnabledTurbo Mode DisabledRadio Channel Default to first channelAuto Channel Sele

Page 186

System Defaults1-13Wireless Interface 802.11b/gIAPP EnabledSSID SMCStatus EnabledChannel Default to first channelAuto Channel Select EnabledSSID Broad

Page 187

Introduction1-14

Page 188 - Interface Commands

2-1Chapter 2Hardware Installation1. Select a Site – Choose a proper place for the access point. In general, the best location is at the center of your

Page 189

Hardware Installation2-2Otherwise, the access point can derive its operating power directly from the RJ-45 port when connected to a device that provid

Page 190

Hardware Installation2-3The access point also compares the strength of an incoming signal on both antennas, and uses the antenna receiving the stronge

Page 191

CopyrightInformation furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for i

Page 192

Hardware Installation2-4

Page 193

3-1Chapter 3Network ConfigurationThe wireless solution supports a stand-alone wireless network configuration as well as an integrated configuration wi

Page 194

Network Configuration3-2Network TopologiesAd Hoc Wireless LAN (no AP or Bridge)An ad hoc wireless LAN consists of a group of computers, each equipped

Page 195

Network Topologies3-3Infrastructure Wireless LANThe access point also provides access to a wired LAN for wireless workstations. An integrated wired/wi

Page 196

Network Configuration3-4Infrastructure Wireless LAN for Roaming Wireless PCsThe Basic Service Set (BSS) defines the communications domain for each acc

Page 197

Network Topologies3-5A wireless infrastructure can also support roaming for mobile workers. More than one access point can be configured to create an

Page 198

Network Configuration3-6

Page 199

4-1Chapter 4Initial ConfigurationThe EliteConnect Universal 2.4GHz/5GHz Wireless Access Point SMC2555W-AG offers a variety of management options, incl

Page 200

Initial Configuration4-2To connect to the console port, complete the following steps:1. Connect the console cable to the serial port on a terminal, or

Page 201

Initial Setup through the CLI4-3Initial Configuration StepsLogging In – Enter “admin” for the user name and “smcadmin” for the password. The CLI promp

Page 202

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Page 203

Initial Configuration4-4accessed using Telnet from any computer attached to the network. Setting the Country Code – Units sold in the United States ar

Page 204

Using the Web-based Management Setup Wizard4-5Logging In – Enter the username “admin,” the password “smcadmin,” and click LOGIN. For information on co

Page 205

Initial Configuration4-6Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] b

Page 206

Using the Web-based Management Setup Wizard4-72. Radio Channel – You must enable radio communications for 802.11a and 802.11b/g, and set the operating

Page 207

Initial Configuration4-8• 802.11b/g802.11g Radio Channel: Set the operating radio channel number. (Range: 1-11; Default: 11)Note: Available channel se

Page 208

Using the Web-based Management Setup Wizard4-9DHCP Client – With DHCP Client enabled, the IP address, subnet mask and default gateway can be dynamical

Page 209

Initial Configuration4-10

Page 210

5-1Chapter 5System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 t

Page 211

System Configuration5-2The information in this chapter is organized to reflect the structure of the web screens for easy reference. However, we recomm

Page 212

Advanced Configuration5-3Radio Interface 1 Configures the IEEE 802.11a interface 5-38Radio Settings Configures radio signal parameters, such as radio

Page 213

LIMITED WARRANTYiiCustomers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from S

Page 214

System Configuration5-4System IdentificationThe system information parameters for the SMC2555W-AG can be left at their default settings. However, modi

Page 215

Advanced Configuration5-5CLI Commands for System Identification – Enter the global configuration mode, and use the system name command to specify a ne

Page 216

System Configuration5-6TCP / IP SettingsConfiguring the SMC2555W-AG with an IP address expands your ability to manage the access point. A number of ac

Page 217

Advanced Configuration5-7DHCP Client (Enable) – Select this option to obtain the IP settings for the access point from a DHCP (Dynamic Host Configurat

Page 218

System Configuration5-8CLI Commands for TCP/IP Settings – From the global configuration mode, enter the interface configuration mode with the interfac

Page 219

Advanced Configuration5-9RadiusRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a centr

Page 220

System Configuration5-10Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point.• IP Address:

Page 221

Advanced Configuration5-11CLI Commands for RADIUS – From the global configuration mode, use the radius-server address command to specify the address o

Page 222 - IAPP Commands

System Configuration5-12AuthenticationWireless clients can be authenticated for network access by checking their MAC address against the local databas

Page 223 - VLAN Commands

Advanced Configuration5-13MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the ne

Page 224

iiiCOMPLIANCESFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B

Page 225

System Configuration5-14• MAC Authentication Settings: Enters specified MAC addresses and permissions into the local MAC database.- MAC Address: Physi

Page 226

Advanced Configuration5-15wireless association with the access point, each client is allowed to access the network.• Supported: The access point suppo

Page 227 - Troubleshooting

System Configuration5-16CLI Commands for Local MAC Authentication – Use the mac-authentication server command from the global configuration mode to en

Page 228

Advanced Configuration5-17CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to

Page 229

System Configuration5-18CLI Commands for 802.1x Authentication – Use the 802.1x supported command from the global configuration mode to enable 802.1x

Page 230 - Maximum Distance Table

Advanced Configuration5-19Filter ControlThe access point can employ VLAN ID and network traffic frame filtering to control access to network resources

Page 231 - Cables and Pinouts

System Configuration5-20Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configurat

Page 232 - 10/100BASE-TX Pin Assignments

Advanced Configuration5-21When VLAN filtering is enabled, the access point must also have 802.1x authentication enabled and a RADIUS server configured

Page 233 - Crossover Wiring

System Configuration5-22CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID fo

Page 234 - Console Port Pin Assignments

Advanced Configuration5-23CLI Commands for Bridge Filtering – Use the filter local-bridge command from the global configuration mode to prevent wirele

Page 235

COMPLIANCESivHigh power radars are allocated as primary users (meaning they have priority) of the 5250-5350 MHz and 5650-5850 MHz bands. These radars

Page 236

System Configuration5-24SNMPYou can use a network management application such as SMC’s EliteView (EliteView v6.11, available in Q4 of 2003) to manage

Page 237 - Specifications

Advanced Configuration5-25SNMP – Enables or disables SNMP management access and also enables the access point to send SNMP traps (notifications). SNMP

Page 238 - °C (32 to 158 °F)

System Configuration5-26CLI Commands for SNMP – Use the snmp-server enable server command from the global configuration mode. To set read/write and re

Page 239 - ÜV/GS), IEC60950 (CB)

Advanced Configuration5-27AdministrationChanging the PasswordManagement access to the web and CLI interface on the SMC2555W-AG is controlled through a

Page 240 - Sensitivity

System Configuration5-28CLI Commands for the User Name and Password – Use the username and password commands from the CLI configuration mode.SMC-AP(co

Page 241 - Transmit Power

Advanced Configuration5-29Upgrading FirmwareYou can upgrade new SMC2555W-AG software from a local file on the management workstation, or from an FTP o

Page 242

System Configuration5-30Before upgrading new software, verify that the SMC2555W-AG is connected to the network and has been configured with a compatib

Page 243 - Glossary

Advanced Configuration5-31Firmware Upgrade Remote – Downloads an operation code image file from a specified remote FTP or TFTP server. After filling i

Page 244 - Glossary-2

System Configuration5-32CLI Commands for Downloading Software from a TFTP Server – Use the copy tftp file command from the Exec mode and then specify

Page 245 - Glossary-3

Advanced Configuration5-33System Log The SMC2555W-AG can be configured to send event and error messages to a System Log Server. The system clock can a

Page 246 - Glossary-4

COMPLIANCESvEC Conformance Declaration SMC contact for these products in Europe is:SMC Networks Europe,Edificio Conata II,Calle Fructuós Gelabert 6-8,

Page 247 - Glossary-5

System Configuration5-34Logging Console – Enables the logging of error messages to the console.Logging Level – Sets the minimum severity level for eve

Page 248 - Glossary-6

Advanced Configuration5-35number to use on the Syslog server. To view the current logging settings, use the show logging command.Configuring SNTPSimpl

Page 249 - Glossary-7

System Configuration5-36SNTP Server – Configures the access point to operate as an SNTP client. When enabled, at least one time server IP address must

Page 250 - Glossary-8

Advanced Configuration5-37daylight savings. To view the current SNTP settings, use the show sntp command.CLI Commands for the System Clock – The follo

Page 251

System Configuration5-38Radio InterfaceThe IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wire

Page 252

Radio Interface5-39Radio Settings (802.11a)The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbp

Page 253

System Configuration5-40Note: In normal mode, the access point provides a channel bandwidth of 20 MHz, and supports the maximum number of channels per

Page 254

Radio Interface5-41clients. You also have to ensure that high-power signals do not interfere with the operation of other radio devices in the service

Page 255

System Configuration5-42sending of a data frame. After receiving an RTS frame, the station sends a CTS (clear to send) frame to notify the sending sta

Page 256

Radio Interface5-43SMC-AP#show interface wireless a 6-95Wireless Interface 802.11a Information========================================================

Comments to this Manuals

No comments