SMC2555W-AG
COMPLIANCESviEuropean Community country. The presence of nearby radar operation may result in temporary interruption of operation of this device. The
System Configuration5-44Radio Settings (802.11g)The IEEE 802.11g standard operates within the 2.4 GHz band at up to 54 Mbps. Also note that because th
Radio Interface5-45access points at least five channels apart to avoid interference with each other. For example, in the United States you can deploy
System Configuration5-46CLI Commands for the 802.11a Wireless Interface – From the global configuration mode, enter the interface wireless g command t
Radio Interface5-47SMC-AP#show interface wireless g 6-95Wireless Interface Information===========================================================-----
System Configuration5-48SecurityThe SMC2555W-AG is configured by default as an “open system,” which broadcasts a beacon signal including the configure
Radio Interface5-49The security mechanisms that may be employed depend on the level of security required, the network and management resources availab
System Configuration5-50Wired Equivalent Privacy (WEP) WEP provides a basic level of security, preventing unauthorized access to the network and encry
Radio Interface5-51Setting up shared keys enables the basic IEEE 802.11 Wired Equivalent Privacy (WEP) on the access point to prevent unauthorized acc
System Configuration5-52Shared Key Setup – Select 64 Bit, 128 Bit, or 152 Bit key length. Note that the same size of encryption key must be supported
Radio Interface5-53encryption command to enable WEP encryption. Use the multicast-cipher command to select WEP cipher type. To enter WEP keys, use the
COMPLIANCESviiOperation Using 5 GHz Channels in the European CommunityThe user/installer must use the provided configuration utility to check the curr
System Configuration5-54Note: The index and length values used in the key command must be the same values used in the encryption and transmit-key comm
Radio Interface5-55Wi-Fi Protected Access (WPA)WPA employs a combination of several technologies to provide an enhanced security solution for 802.11 w
System Configuration5-56Note: To implement WPA on wireless clients requires a WPA-enabled network card driver and 802.1x client software that supports
Radio Interface5-57multicast and broadcast traffic must be the same for all clients, therefore it restricts encryption to a WEP key. When access is op
System Configuration5-58WPA Key Management – WPA can be configured to work in an enterprise environment using IEEE 802.1x and a RADIUS server for user
Radio Interface5-59WPA Pre-Shared Key Type – If the WPA pre-shared-key mode is used, all wireless clients must be configured with the same key to comm
System Configuration5-60authentication. To view the current 802.11g security settings, use the show interface wireless a or show interface wireless g
Status Information5-61Status InformationThe Status page includes information on the following items:Access Point StatusThe AP Status window displays b
System Configuration5-62AP System Configuration – The AP System Configuration table displays the basic system configuration settings:• System Up Time:
Status Information5-63CLI Commands for Displaying System Settings – To view the current access point system settings, use the show system command from
COMPLIANCESviiiDeclaration of Conformity in Languages of the European CommunityEnglish Hereby, SMC Networks, declares that this Radio LAN device is in
System Configuration5-64Station StatusThe Station Status window shows the wireless clients currently associated with the SMC2555W-AG.The Station Confi
Status Information5-65completed, stations can associate with the current access point, or reassociate with a new access point. The association procedu
System Configuration5-66Event LogsThe Event Logs window shows the log messages generated by the access point and stored in memory.The Event Logs table
Status Information5-67• WEP keys do not match: When the access point uses “Shared Key Authentication,” but the key used by client and access point are
System Configuration5-68
6-1Chapter 6Command Line InterfaceUsing the Command Line InterfaceAccessing the CLIWhen accessing the management interface for the SMC2555W-AG over a
Command Line Interface6-2After connecting to the system through the console port, the login screen displays:Note: Command examples shown later in this
Entering Commands6-3After you configure the access point with an IP address, you can open a Telnet session by performing these steps.1. From the remot
Command Line Interface6-4You can enter commands as follows:• To enter a simple command, enter the command keyword. • To enter commands that require pa
Entering Commands6-5list of valid keywords for a specific command. For example, the command “show ?” displays a list of possible show commands:The com
COMPLIANCESixSafety ComplianceUnderwriters Laboratories Compliance StatementImportant! Before making connections, make sure you have the correct cord
Command Line Interface6-6Negating the Effect of CommandsFor many configuration commands you can enter the prefix keyword “no” to cancel the effect of
Entering Commands6-7Exec CommandsWhen you open a new console session on the access point, the system enters Exec command mode. Only a limited number o
Command Line Interface6-8To enter the Global Configuration mode, enter the command configure in Exec mode. The system prompt will change to “SMC Enter
Entering Commands6-9Ctrl-N Enters the next command line in the history buffer.Ctrl-P Shows the last command.Ctrl-R Repeats current command line on a n
Command Line Interface6-10Command GroupsThe system commands can be broken down into the functional groups shown below.The access mode shown in the fol
General Commands6-11General CommandsconfigureThis command activates Global Configuration mode. You must enter this mode to modify most of the settings
Command Line Interface6-12endThis command returns to the previous configuration mode.Default Setting NoneCommand Mode Global Configuration, Interface
General Commands6-13pingThis command sends ICMP echo request packets to another node on the network.Syntax ping <host_name | ip_address> • host_
Command Line Interface6-14resetThis command restarts the system or restores the factory default settings.Syntax reset <board | configuration> •
General Commands6-15Command Usage • The history buffer size is fixed at 10 commands.• Use the up or down arrow keys to scroll through the commands in
COMPLIANCESxWichtige Sicherheitshinweise (Germany)1. Bitte lesen Sie diese Hinweise sorgfältig durch.2. Heben Sie diese Anleitung für den späteren G
Command Line Interface6-16System Management CommandsThese commands are used to configure the user name, password, system logs, browser management opti
System Management Commands6-17logging console Initiates logging of error messages to the consoleGC 6-25logging level Defines the minimum severity leve
Command Line Interface6-18countryThis command configures the access point’s country code, which identifies the country of operation and sets the autho
System Management Commands6-19Default Setting US - for units sold in the United States99 (no country set) - for units sold in other countriesCommand M
Command Line Interface6-20promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstr
System Management Commands6-21Command Mode Global ConfigurationExample usernameThis command configures the user name for management access.Syntax user
Command Line Interface6-22passwordAfter initially logging onto the system, you should set the password. Remember to record it in a safe place. Use the
System Management Commands6-23Command Mode Global ConfigurationExampleRelated Commandsip http server (page 6-23)ip http serverThis command allows this
Command Line Interface6-24logging onThis command controls logging of error messages; i.e., sending debug or error messages to memory. The no form disa
System Management Commands6-25Default Setting NoneCommand Mode Global ConfigurationExample logging consoleThis command initiates logging of error mess
COMPLIANCESxiAC 7,5-8V, 50-60Hz nicht über oder unterschreiten sowie den minimalen Strom von 1A nicht unterschreiten.Der arbeitsplatzbezogene Schalldr
Command Line Interface6-26logging levelThis command sets the minimum severity level for event logging.Syntaxlogging level <Alert | Critical | Error
System Management Commands6-27logging facility-typeThis command sets the facility type for remote logging of syslog messages.Syntaxlogging facility-ty
Command Line Interface6-28Examplesntp-server ipThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this co
System Management Commands6-29Command Usage When SNTP client mode is enabled using the sntp-server enable command, the sntp-server ip command specifie
Command Line Interface6-30Example Related Commandssntp-server ip (page 6-28)show sntp (page 6-32)sntp-server date-timeThis command sets the system clo
System Management Commands6-31sntp-server daylight-savingThis command sets the start and end dates for daylight savings time. Use the no form to disab
Command Line Interface6-32sntp-server timezoneThis command sets the time zone for the access point’s internal clock.Syntaxsntp-server timezone <hou
System Management Commands6-33Example show systemThis command displays basic system configuration settings.Default SettingNoneCommand Mode ExecSMC-AP#
Command Line Interface6-34Exampleshow versionThis command displays the software version for the system.Default SettingNoneCommand Mode ExecExample SMC
SNMP Commands6-35SNMP CommandsControls access to this access point from management stations using the Simple Network Management Protocol (SNMP), as we
COMPLIANCESxii
Command Line Interface6-36• ro - Specifies read-only access. Authorized management stations are only able to retrieve MIB objects. • rw - Specifies re
SNMP Commands6-37Command Mode Global ConfigurationExample Related Commandssnmp-server location (page 6-39)snmp-server enable serverThis command enable
Command Line Interface6-38Related Commandssnmp-server host (page 6-38)snmp-server host This command specifies the recipient of an SNMP notification. U
SNMP Commands6-39Example Related Commandssnmp-server enable server (page 6-37)snmp-server locationThis command sets the system location string. Use th
Command Line Interface6-40show snmpThis command displays the SNMP configuration settings.Command Mode ExecExampleFlash/File CommandsThese commands are
Flash/File Commands6-41bootfileThis command specifies the image used to start up the system.Syntaxbootfile <filename>filename - Name of the imag
Command Line Interface6-42copy This command copies a boot file, code image, or configuration file between the access point’s flash memory and a FTP/TF
Flash/File Commands6-43server is 255 characters or 32 characters for files on the access point. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)• Due
Command Line Interface6-44Command Mode ExecCaution: Beware of deleting application images from flash memory. At least one application image is require
RADIUS Client6-45Example The following example shows how to display all file information:RADIUS ClientRemote Authentication Dial-in User Service (RADI
xiiiTABLE OF CONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Package Checklist . . . . . . . . . . . . . . . .
Command Line Interface6-46radius-server addressThis command specifies the primary and secondary RADIUS servers. Syntaxradius-server address [secondary
RADIUS Client6-47Example radius-server keyThis command sets the RADIUS encryption key. Syntax radius-server [secondary] key <key_string>• second
Command Line Interface6-48Default Setting 3Command Mode Global ConfigurationExample radius-server timeoutThis command sets the interval between transm
RADIUS Client6-49show radiusThis command displays the current settings for the RADIUS server.Default SettingNoneCommand Mode ExecExample SMC-AP#show r
Command Line Interface6-50802.1x Port AuthenticationThe access point supports IEEE 802.1x access control for wireless clients. This control feature pr
802.1x Port Authentication6-51802.1xThis command configures 802.1x as optionally supported or as required for wireless clients. Use the no form to dis
Command Line Interface6-52initiate 802.1x authentication). For stations initiating 802.1x, only those stations successfully authenticated are allowed
802.1x Port Authentication6-53broadcast-key-refresh-rate command specifies the interval after which the broadcast keys are changed. The 802.1x session
Command Line Interface6-54802.1x session-timeoutThis command sets the time period after which a connected client must be re-authenticated. Use the no
802.1x Port Authentication6-55Command ModeGlobal ConfigurationExampleRelated Commandsaddress filter entry (page 6-55)show authentication (page 6-59)ad
TABLE OF CONTENTSxivStation Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-64Event Logs . . . . . . . . . . . . . . . . . .
Command Line Interface6-56ExampleRelated Commandsaddress filter default (page 6-54)show authentication (page 6-59)address filter deleteThis command de
802.1x Port Authentication6-57mac-authentication serverThis command sets address filtering to be performed with local or remote options. Use the no fo
Command Line Interface6-58mac-authentication session-timeoutThis command sets the interval at which associated clients will be re-authenticated with t
802.1x Port Authentication6-59show authenticationThis command shows all 802.1x authentication settings, as well as the address filter table.Command Mo
Command Line Interface6-60Filtering CommandsThe commands described in this section are used to filter communications between wireless clients, control
Filtering Commands6-61Command UsageThis command can disable wireless-to-wireless communications between clients via the access point. However, it does
Command Line Interface6-62filter ethernet-type enableThis command checks the Ethernet type on all incoming and outgoing Ethernet packets against the p
Filtering Commands6-63filter ethernet-type protocolThis command sets a filter for a specific Ethernet type. Use the no form to disable filtering for a
Command Line Interface6-64show filtersThis command shows the filter options and protocol entries in the filter table. Command ModeExecExampleInterface
Interface Commands6-65Ethernet Interfacedns primary-server Specifies the primary name serverIC-E 6-68dns secondary-server Specifies the secondary na
TABLE OF CONTENTSxvlogging host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-24logging console . . . . . . . . . . . . . . . .
Command Line Interface6-66ssid Configures the service set identifierIC-W 6-79beacon-interval Configures the rate at which beacon signals are transmi
Interface Commands6-67transmit-power Adjusts the power of the radio signals transmitted from the access pointIC-W 6-87max-association Configures the
Command Line Interface6-68interfaceThis command configures an interface type and enters interface configuration mode. Syntaxinterface <ethernet | w
Interface Commands6-69Default Setting NoneCommand Mode Global ConfigurationCommand Usage The primary and secondary name servers are queried in sequenc
Command Line Interface6-70Default Setting IP address: 192.168.2.2Netmask: 255.255.255.0Command Mode Interface Configuration (Ethernet)Command Usage •
Interface Commands6-71ip dhcp This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP ad
Command Line Interface6-72Related Commandsip address (page 6-69)shutdown This command disables the Ethernet interface. To restart a disabled interface
Interface Commands6-73Default Setting Ethernet interfaceCommand Mode ExecExample radio-mode This command sets the working mode for the wireless interf
Command Line Interface6-74Command Mode Interface Configuration (Wireless g)Exampleselect-antenna-mode This command selects the built-in antennas or an
Interface Commands6-75description This command adds a description to a the wireless interface. Use the no form to remove the description.Syntaxdescrip
TABLE OF CONTENTSxviaddress filter entry . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-55address filter delete . . . . . . . . . . . . .
Command Line Interface6-76Command Usage When SSID broadcast is disabled, the access point will not include its SSID in beacon messages. Nor will it re
Interface Commands6-77ExamplechannelThis command configures the radio channel through which the access point communicates with wireless clients. Synta
Command Line Interface6-78• For most wireless adapters, the channel for wireless clients is automatically set to the same as that used by the access p
Interface Commands6-79ssidThis command configures the service set identifier (SSID). Syntaxssid stringstring - The name of a basic service set support
Command Line Interface6-80Command Mode Interface Configuration (Wireless)Command Usage The beacon signals allow wireless clients to maintain contact w
Interface Commands6-81indicates that the access point will save all broadcast/multicast frames for the Basic Service Set (BSS) and forward them after
Command Line Interface6-82collisions due to high network utilization, try setting the fragment size to send smaller fragments. This will speed up the
Interface Commands6-83RTS frame, the station sends a CTS frame to notify the sending station that it can start sending data. • Access points contendin
Command Line Interface6-84ExampleRelated Commandsencryption (page 6-84)key (page 6-85)encryption This command defines whether or not WEP encryption is
Interface Commands6-85• Note that WEP protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network
TABLE OF CONTENTSxviiwpa-mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-92wpa-preshared-key . . . . . . . . . . . . . . .
Command Line Interface6-86Command Usage • To enable Wired Equivalent Privacy (WEP), use the authentication command to select the “shared key” authenti
Interface Commands6-87Command Mode Interface Configuration (Wireless)Command Usage • If you use WEP key encryption, the access point uses the transmit
Command Line Interface6-88Command Usage • The “min” keyword indicates minimum power.• The longer the transmission distance, the higher the transmissio
Interface Commands6-89multicast-cipher This command defines the cipher algorithm used for broadcasting and multicasting when using Wi-Fi Protected Acc
Command Line Interface6-90• TKIP defends against attacks on WEP in which the unencrypted initialization vector in encrypted packets is used to calcula
Interface Commands6-91Command Usage Wi-Fi Protected Access (WPA) provides improved data encryption, which was weak in WEP, and user authentication, wh
Command Line Interface6-92wpa-mode This command specifies whether Wi-Fi Protected Access (WPA) is to use 802.1x dynamic keys or a pre-shared key.Synta
Interface Commands6-93wpa-preshared-key This command defines a Wi-Fi Protected Access (WPA) preshared-key.Syntaxwpa-preshared-key <type> <val
Command Line Interface6-94wpa-psk-type This command defines the Wi-Fi Protected Access (WPA) preshared-key type.Syntaxwpa-psk-type <type>type -
Interface Commands6-95Example show interface wirelessThis command displays the status for the wireless interface.Syntaxshow interface wireless <a |
TABLE OF CONTENTSxviiiAppendicesA Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . .A-1Maximum Distance Table . . . . . . . . . . .
Command Line Interface6-96Example SMC-AP#show interface wireless gWireless Interface Information======================================================
Interface Commands6-97show stationThis command shows the wireless clients associated with the access point.Command Mode ExecExample SMC-AP#show statio
Command Line Interface6-98IAPP CommandsThe command described in this section enables the protocol signaling required to ensure the successful handover
VLAN Commands6-99VLAN CommandsThe access point can enable the support of VLAN-tagged traffic passing between wireless clients and the wired network. U
Command Line Interface6-100vlanThis command enables VLANs for all traffic. Use the no form to disable VLANs.Syntaxvlan enable no vlanDefaultDisabledCo
VLAN Commands6-101native-vlanid This command configures the native VLAN ID for the access point. Syntaxnative-vlanid <vlan-id>vlan-id - Native V
Command Line Interface6-102
A-1Appendix ATroubleshootingCheck the following items before you contact technical support.1. If wireless clients cannot access the network, check the
TroubleshootingA-22. If the access point cannot be configured using Telnet, a web browser, or SNMP software:• Be sure to have configured the access po
TroubleshootingA-34. If you forgot or lost the password:• Set the access point to its default configuration by pressing the reset button on the back p
1-1Chapter 1IntroductionSMC’s EliteConnect Universal 2.4GHz/5GHz Wireless Access Point (SMC2555W-AG) is an IEEE 802.11a/g access point that provides t
TroubleshootingA-4Maximum Distance TableImportant NoticeMaximum distances posted below are actual tested distance thresholds. However, there are many
B-1Appendix BCables and PinoutsTwisted-Pair Cable Assignments Caution: DO NOT plug a phone jack connector into the RJ-45 port. Use only twisted-pair c
Cables and PinoutsB-210/100BASE-TX Pin AssignmentsUse unshielded twisted-pair (UTP) or shielded twisted-pair (STP) cable for RJ-45 connections: 100-oh
Twisted-Pair Cable AssignmentsB-3Straight-Through WiringBecause the 10/100 Mbps port on the access point uses an MDI pin configuration, you must use “
Cables and PinoutsB-4Console Port Pin AssignmentsThe DB-9 DCE serial port on the front panel of the SMC2555W-AG is used to connect to the access point
Console Port Pin AssignmentsB-5Serial Cable Signal Directions for DB-9 PortsSerial Cable Signal Directions for DB-25 PortsDB-9 to DB-9 AP Terminal or
Cables and PinoutsB-6
C-1Appendix CSpecificationsGeneral SpecificationsMaximum Channels802.11a:US & Canada: 13 (normal mode), 5 (turbo mode)Japan: 4 (normal mode), 1 (t
SpecificationsC-2Operating Frequency802.11a:5.15 ~ 5.25 GHz (lower band) US/Canada, Japan5.25 ~ 5.35 GHz (middle band) US/Canada5.725 ~ 5.825 GHz (upp
General SpecificationsC-3Humidity15% to 95% (non-condensing)CompliancesIEC 61000-4-2/3/4/6/11EMC Compliance (Class B)FCC Class B (US)ICES-003 (Canada)
Introduction1-2The access point also supports a 54 Mbps half-duplex connection to Ethernet networks for each active channel (up to 108 Mbps in turbo m
SpecificationsC-4SensitivityIEEE 802.11a Sensitivity (GHz - dBm)Modulation/Rates 5.15-5.250 5.25-5.350 5.50-5.700 5.725-5.825BPSK (6 Mbps) -88 -88 -88
General SpecificationsC-5Transmit Power IEEE 802.11a Maximum Output Power (GHz - dBm)Data Rate 5.15-5.250 5.25-5.350 5.50-5.700 5.725-5.8256 Mbps 17 1
SpecificationsC-6
Glossary-1Glossary10BASE-TIEEE 802.3 specification for 10 Mbps Ethernet over two pairs of Category 3 or better UTP cable.100BASE-TXIEEE 802.3u specifi
GlossaryGlossary-2Backbone The core infrastructure of a network. The portion of the network that transports information from one central location to a
GlossaryGlossary-3Extended Service Set (ESS)More than one wireless cell can be configured with the same Service Set Identifier to allow mobile users c
GlossaryGlossary-4IEEE 802.11bA wireless standard that supports wireless communications in the 2.4 GHz band using Direct Sequence Spread Spectrum (DSS
GlossaryGlossary-5Network Time Protocol (NTP)NTP provides the mechanisms to synchronize time across the network. The time servers operate in a hierarc
GlossaryGlossary-6Problem.” If the packet size is smaller than the preset RTS Threshold size, the RTS/CTS mechanism will NOT be enabled.Service Set Id
GlossaryGlossary-7Trivial File Transfer Protocol (TFTP)A TCP/IP protocol commonly used for software downloads.Virtual LAN (VLAN)A Virtual LAN is a col
Hardware Description1-3Hardware DescriptionFront PanelRear PanelAntennasIndicator PanelSecurity SlotConsole PortRJ-45 Port,PoE ConnectorReset Button5
GlossaryGlossary-8
Index-1AAdvanced Encryption Standard See AESAES 5-57antennas, positioning 2-2authentication 5-12, 6-83configuring 5-12, 6-83MAC address 5-13, 6-54, 6
IndexIndex-2filter 5-19, 6-54address 5-12, 6-54between wireless clients 5-21, 6-60local bridge 5-21, 6-60local or remote 5-12, 6-57management access 5
IndexIndex-3OOFDM 1-1open system 5-48operating frequency C-2Ppackage checklist 1-2passwordconfiguring 5-27, 6-22management 5-27, 6-22pin assignmentsco
IndexIndex-4TTelnetfor managenet access 6-2Temporal Key Integrity Protocol See TKIPtime zone 5-36, 6-32TKIP 5-56, 6-89transmit power, configuring 5-4
38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; Phn: (
Introduction1-4Component DescriptionAntennasThe access point includes two antennas for wireless communications. The signal transmitted from both anten
Hardware Description1-5Security SlotThe access point includes a Kensington security slot on the rear panel. You can prevent unauthorized removal of th
Introduction1-6Console PortThis port is used to connect a console device to the access point through a serial cable. This connection is described unde
Features and Benefits1-7changes you may have made are removed, and the factory default configuration is restored to the access point. Power ConnectorT
38 TeslaIrvine, CA 92618Phone: (949) 679-8000EliteConnect™ Universal2.4GHz/5GHz Wireless Access PointUser GuideThe easy way to make all your network c
Introduction1-8• Scans all available channels and selects the best channel for each client based on the signal-to-noise ratioApplicationsThe Wireless
System Defaults1-9System DefaultsThe following table lists some of the access point’s basic system defaults. To reset the access point defaults, use t
Introduction1-10MAC AuthenticationMAC Local MACAuthentication Session Timeout0 seconds (disabled)Local MAC System DefaultAllowedLocal MAC PermissionAl
System Defaults1-11System LoggingSyslog DisabledLogging Host DisabledLogging Console DisabledIP Address / Host Name0.0.0.0Logging Level InformationalL
Introduction1-12Wireless Interface 802.11aIAPP EnabledSSID SMCStatus EnabledTurbo Mode DisabledRadio Channel Default to first channelAuto Channel Sele
System Defaults1-13Wireless Interface 802.11b/gIAPP EnabledSSID SMCStatus EnabledChannel Default to first channelAuto Channel Select EnabledSSID Broad
Introduction1-14
2-1Chapter 2Hardware Installation1. Select a Site – Choose a proper place for the access point. In general, the best location is at the center of your
Hardware Installation2-2Otherwise, the access point can derive its operating power directly from the RJ-45 port when connected to a device that provid
Hardware Installation2-3The access point also compares the strength of an incoming signal on both antennas, and uses the antenna receiving the stronge
CopyrightInformation furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for i
Hardware Installation2-4
3-1Chapter 3Network ConfigurationThe wireless solution supports a stand-alone wireless network configuration as well as an integrated configuration wi
Network Configuration3-2Network TopologiesAd Hoc Wireless LAN (no AP or Bridge)An ad hoc wireless LAN consists of a group of computers, each equipped
Network Topologies3-3Infrastructure Wireless LANThe access point also provides access to a wired LAN for wireless workstations. An integrated wired/wi
Network Configuration3-4Infrastructure Wireless LAN for Roaming Wireless PCsThe Basic Service Set (BSS) defines the communications domain for each acc
Network Topologies3-5A wireless infrastructure can also support roaming for mobile workers. More than one access point can be configured to create an
Network Configuration3-6
4-1Chapter 4Initial ConfigurationThe EliteConnect Universal 2.4GHz/5GHz Wireless Access Point SMC2555W-AG offers a variety of management options, incl
Initial Configuration4-2To connect to the console port, complete the following steps:1. Connect the console cable to the serial port on a terminal, or
Initial Setup through the CLI4-3Initial Configuration StepsLogging In – Enter “admin” for the user name and “smcadmin” for the password. The CLI promp
iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un
Initial Configuration4-4accessed using Telnet from any computer attached to the network. Setting the Country Code – Units sold in the United States ar
Using the Web-based Management Setup Wizard4-5Logging In – Enter the username “admin,” the password “smcadmin,” and click LOGIN. For information on co
Initial Configuration4-6Launching the Setup Wizard – To perform initial configuration, click Setup Wizard on the home page, then click on the [Next] b
Using the Web-based Management Setup Wizard4-72. Radio Channel – You must enable radio communications for 802.11a and 802.11b/g, and set the operating
Initial Configuration4-8• 802.11b/g802.11g Radio Channel: Set the operating radio channel number. (Range: 1-11; Default: 11)Note: Available channel se
Using the Web-based Management Setup Wizard4-9DHCP Client – With DHCP Client enabled, the IP address, subnet mask and default gateway can be dynamical
Initial Configuration4-10
5-1Chapter 5System ConfigurationBefore continuing with advanced configuration, first complete the initial configuration steps described in Chapter 4 t
System Configuration5-2The information in this chapter is organized to reflect the structure of the web screens for easy reference. However, we recomm
Advanced Configuration5-3Radio Interface 1 Configures the IEEE 802.11a interface 5-38Radio Settings Configures radio signal parameters, such as radio
LIMITED WARRANTYiiCustomers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from S
System Configuration5-4System IdentificationThe system information parameters for the SMC2555W-AG can be left at their default settings. However, modi
Advanced Configuration5-5CLI Commands for System Identification – Enter the global configuration mode, and use the system name command to specify a ne
System Configuration5-6TCP / IP SettingsConfiguring the SMC2555W-AG with an IP address expands your ability to manage the access point. A number of ac
Advanced Configuration5-7DHCP Client (Enable) – Select this option to obtain the IP settings for the access point from a DHCP (Dynamic Host Configurat
System Configuration5-8CLI Commands for TCP/IP Settings – From the global configuration mode, enter the interface configuration mode with the interfac
Advanced Configuration5-9RadiusRemote Authentication Dial-in User Service (RADIUS) is an authentication protocol that uses software running on a centr
System Configuration5-10Primary Radius Server Setup – Configure the following settings to use RADIUS authentication on the access point.• IP Address:
Advanced Configuration5-11CLI Commands for RADIUS – From the global configuration mode, use the radius-server address command to specify the address o
System Configuration5-12AuthenticationWireless clients can be authenticated for network access by checking their MAC address against the local databas
Advanced Configuration5-13MAC Authentication – You can configure a list of the MAC addresses for wireless clients that are authorized to access the ne
iiiCOMPLIANCESFederal Communication Commission Interference StatementThis equipment has been tested and found to comply with the limits for a Class B
System Configuration5-14• MAC Authentication Settings: Enters specified MAC addresses and permissions into the local MAC database.- MAC Address: Physi
Advanced Configuration5-15wireless association with the access point, each client is allowed to access the network.• Supported: The access point suppo
System Configuration5-16CLI Commands for Local MAC Authentication – Use the mac-authentication server command from the global configuration mode to en
Advanced Configuration5-17CLI Commands for RADIUS MAC Authentication – Use the mac-authentication server command from the global configuration mode to
System Configuration5-18CLI Commands for 802.1x Authentication – Use the 802.1x supported command from the global configuration mode to enable 802.1x
Advanced Configuration5-19Filter ControlThe access point can employ VLAN ID and network traffic frame filtering to control access to network resources
System Configuration5-20Native VLAN ID – The VLAN ID assigned to wireless clients that are not assigned to a specific VLAN by RADIUS server configurat
Advanced Configuration5-21When VLAN filtering is enabled, the access point must also have 802.1x authentication enabled and a RADIUS server configured
System Configuration5-22CLI Commands for VLAN Support – From the global configuration mode use the native-vlanid command to set the default VLAN ID fo
Advanced Configuration5-23CLI Commands for Bridge Filtering – Use the filter local-bridge command from the global configuration mode to prevent wirele
COMPLIANCESivHigh power radars are allocated as primary users (meaning they have priority) of the 5250-5350 MHz and 5650-5850 MHz bands. These radars
System Configuration5-24SNMPYou can use a network management application such as SMC’s EliteView (EliteView v6.11, available in Q4 of 2003) to manage
Advanced Configuration5-25SNMP – Enables or disables SNMP management access and also enables the access point to send SNMP traps (notifications). SNMP
System Configuration5-26CLI Commands for SNMP – Use the snmp-server enable server command from the global configuration mode. To set read/write and re
Advanced Configuration5-27AdministrationChanging the PasswordManagement access to the web and CLI interface on the SMC2555W-AG is controlled through a
System Configuration5-28CLI Commands for the User Name and Password – Use the username and password commands from the CLI configuration mode.SMC-AP(co
Advanced Configuration5-29Upgrading FirmwareYou can upgrade new SMC2555W-AG software from a local file on the management workstation, or from an FTP o
System Configuration5-30Before upgrading new software, verify that the SMC2555W-AG is connected to the network and has been configured with a compatib
Advanced Configuration5-31Firmware Upgrade Remote – Downloads an operation code image file from a specified remote FTP or TFTP server. After filling i
System Configuration5-32CLI Commands for Downloading Software from a TFTP Server – Use the copy tftp file command from the Exec mode and then specify
Advanced Configuration5-33System Log The SMC2555W-AG can be configured to send event and error messages to a System Log Server. The system clock can a
COMPLIANCESvEC Conformance Declaration SMC contact for these products in Europe is:SMC Networks Europe,Edificio Conata II,Calle Fructuós Gelabert 6-8,
System Configuration5-34Logging Console – Enables the logging of error messages to the console.Logging Level – Sets the minimum severity level for eve
Advanced Configuration5-35number to use on the Syslog server. To view the current logging settings, use the show logging command.Configuring SNTPSimpl
System Configuration5-36SNTP Server – Configures the access point to operate as an SNTP client. When enabled, at least one time server IP address must
Advanced Configuration5-37daylight savings. To view the current SNTP settings, use the show sntp command.CLI Commands for the System Clock – The follo
System Configuration5-38Radio InterfaceThe IEEE 802.11a and 802.11g interfaces include configuration options for radio signal characteristics and wire
Radio Interface5-39Radio Settings (802.11a)The IEEE 802.11a interface operates within the 5 GHz band, at up to 54 Mbps in normal mode or up to 108 Mbp
System Configuration5-40Note: In normal mode, the access point provides a channel bandwidth of 20 MHz, and supports the maximum number of channels per
Radio Interface5-41clients. You also have to ensure that high-power signals do not interfere with the operation of other radio devices in the service
System Configuration5-42sending of a data frame. After receiving an RTS frame, the station sends a CTS (clear to send) frame to notify the sending sta
Radio Interface5-43SMC-AP#show interface wireless a 6-95Wireless Interface 802.11a Information========================================================
Comments to this Manuals