Motorola RFS7000 Series Installation Guide

Browse online or download Installation Guide for Network switches Motorola RFS7000 Series. Motorola RFS7000 Series Installation guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 466
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - RFS7000 Series RF Switch

RFS7000 Series RF SwitchSystem Reference Guide

Page 2

x RFS7000 Series Switch System Reference GuideLayer 3 Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 3 - About this Guide

Network Setup4-14 Use the Switch Virtual Interfaces screen to view and configure VLAN interfaces. This screen contains two tabs supporting the followi

Page 4 - Notational Conventions

Network Setup4-15 The Associated Secondary IP Addresses field displays additional IP and subnet resources available, but designated as secondary and n

Page 5 - Contents

Network Setup4-16 5. Provide a Description for the VLAN, representative of the VLAN’s intended operation within the switch managed network.6. The Prim

Page 6

Network Setup4-17 2. Select the Configuration tab and click the Edit button.The screen displays with the name of the VLAN displayed in the upper left-

Page 7 - Chapter 4. Network Setup

Network Setup4-18 2. Select the Statistics tab.3. Refer to the following to assess the network throughput of existing virtual interfaces:Name Displays

Page 8

Network Setup4-19 3. Click the Details button to view packet level statistics of any user defined interface. For more information, see Viewing Virtual

Page 9 - Chapter 5. Switch Services

Network Setup4-20 4.4.2.1 Viewing Virtual Interface StatisticsTo view detailed virtual interface statistics: 1. Select a virtual interface from the St

Page 10 - Chapter 6. Switch Security

Network Setup4-21 4. The Status is the current state of requests made from the applet. Requests are any “SET/GET” operation from the applet. The Statu

Page 11 - Table of Contents xi

Network Setup4-22 4. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something

Page 12 - Chapter 7. Switch Management

Network Setup4-23 4.5 Viewing and Configuring Switch WLANsA wireless LAN (WLAN) is a local area network (LAN) without wires. WLANs transfer data throu

Page 13 - Table of Contents xiii

Table of Contents xiReviewing ACL Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-31Configuring NAT Info

Page 14

Network Setup4-24 The Configuration tab displays the following details:Index Displays the WLAN’s numerical identifier. The WLAN index range is from 1

Page 15 - Overview

Network Setup4-25 3. Click the Edit button to display a screen where WLAN information, encryption and authentication settings can be viewed or changed

Page 16 - 1.1.1 Physical Specifications

Network Setup4-26 Manual Mapping of WLANsUse this option (its selected by default) for custom WLAN to Radio mappings. When Advanced Configuration is d

Page 17 - 1.1.1.3 Cabling Requirements

Network Setup4-27 4.5.1.1 Editing the WLAN ConfigurationSecurity measures for the switch and its WLANs are critical. Use the available switch security

Page 18 - 6\VWHP6WDWXV

Network Setup4-28 The Wireless LANs Edit screen is divided into the following user-configurable fields:• Configuration• Authentication• Encryption• Ad

Page 19 - Temperature Status LED

Network Setup4-29 6. Refer to the Authentication field to select amongst the following options:7. Refer to the Encryption field to select amongst the

Page 20 - RJ-45 Port Status LED

Network Setup4-30 8. Refer to the Advanced field for the following information:WPA2-CCMP WPA2 is a newer 802.11i standard that provides even stronger

Page 21 - 1.2 Software Overview

Network Setup4-31 9. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something

Page 22 - 1.2.1 Infrastructure Features

Network Setup4-32 pool representative of the WLAN. The switch tracks the number of MUs per VLAN, and assigns the least used/loaded VLAN to the MU. Thi

Page 23 - 1.2.1.6 Tracing / Logging

Network Setup4-33 10. Click OK to use the changes to the running configuration and close the dialog.11. Click Cancel to close the dialog without commi

Page 24 - 1.2.1.9 Redundancy

xii RFS7000 Series Switch System Reference GuideConfiguring Enhanced Beacons and Probes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Page 25 - 1.2.2 Wireless Switching

Network Setup4-34 The 802.1x EAP screen displays. 5. Configure the Advanced field as required to define MU timeout and retry information for the authe

Page 26 - 802.11bg

Network Setup4-35 5. Click the Config button to the right of the Kerberos checkbox. The Kerberos screen displays.6. Specify a case-sensitive Realm Nam

Page 27 - 1.2.2.4 Hotspot / IP Redirect

Network Setup4-36 2. External Web-pages3. Customized internal Web page (using the Advanced feature in hotspot configuration) When a user visits a publ

Page 28 - 1.2.2.7 Self Healing

Network Setup4-37 3. Select the Hotspot button from within the Authentication field. The Radius Config... button on the bottom of the screen becomes e

Page 29 - 1.2.2.8 Wireless Capacity

Network Setup4-38 3. Select the Hotspot button from within the Authentication field. Ensure Internal is selected from within the This WLAN’s Web Pages

Page 30 - 1.2.2.10 Wireless Roaming

Network Setup4-39 5. Refer to the Allow List field, and enter any IP address (for internal or external Web sites) accessed by the Hotspot user without

Page 31 - 1.2.2.12 QoS

Network Setup4-40 3. Select the Hotspot button from within the Authentication field. Ensure External is selected from within the This WLAN’s Web Pages

Page 32 - DSCP to AC Mapping

Network Setup4-41 5. Refer to the Allow List field, and enter any IP address (for internal or external Web sites) that may be accessed by the Hotspot

Page 33 - Packet Flows

Network Setup4-42 Ensure Advanced is selected from within the This WLAN’s Web Pages are of the drop-down menu.5. Once the properties of the advanced h

Page 34 - Roaming Across a Cluster

Network Setup4-43 f. Specify the appropriate Path to the hotspot configuration on the local system disk or server. g. Once the location and settings f

Page 35 - 1.2.3 Wired Switching

Table of Contents xiiiReviewing Panic Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17Viewing Pani

Page 36 - 1.2.5 Security Features

Network Setup4-44 To configure an external Radius Server for EAP 802.1x, Hotspot or Dynamic MAC ACL WLAN support: 1. Select Network > Wireless LANs

Page 37 - 1.2.5.2 MU Authentication

Network Setup4-45 The Radius Configuration screen contains tabs for defining both the Radius and NAC server settings. For a NAC overview, see Configur

Page 38 - 1.2.5.7 802.1x Authentication

Network Setup4-46 7. Refer to the Accounting field and define the following credentials for a primary and secondary Radius Server. 8. Select the Re-au

Page 39 - 1.2.5.8 WIPS

Network Setup4-47 11. Click Cancel to revert back to the last saved configuration and move back to the Network > Wireless LANs > Edit screen.Con

Page 40 - 1.2.5.9 Rogue AP Detection

Network Setup4-48 6. Select the NAC tab to configure NAC support.7. Refer to the Server field and define the following credentials for a primary and s

Page 41 - 1.2.5.12 IPSec VPN

Network Setup4-49 8. Refer to the Accounting field and define the following credentials for a primary and secondary NAC Server. 9. Select the Re-authe

Page 42 - 1.2.5.14 Firewall

Network Setup4-50 4.5.1.4 Configuring Different Encryption TypesTo configure the WLAN data encryption options available on the switch, refer to the fo

Page 43

Network Setup4-51 6. Use the Key #1-4 areas to specify keys.The key can be either a hexadecimal or ASCII string. For WEP 64 (40-bit key), the keys are

Page 44 - 1.2.6 Access Port Support

Network Setup4-52 5. Specify a 4 to 32 character Pass Key and click the Generate button. The pass key can be any alphanumeric string. The switch and M

Page 45 - & Image Upgrades

Network Setup4-53 WPA's encryption method is Temporal Key Integrity Protocol (TKIP). TKIP addresses WEP’s weaknesses with a re-keying mechanism,

Page 46 - Installing the System Iamge

xiv RFS7000 Series Switch System Reference Guide

Page 47 - 2.2 Switch Password Recovery

Network Setup4-54 Only broadcast key changes when required to reduce the transmissions of sensitive key information. This value is enabled by default.

Page 48

Network Setup4-55 10. Click OK to use the changes to the running configuration and close the dialog.11. Click Cancel to close the dialog without commi

Page 49 - Switch Information

Network Setup4-56 4. To view WLAN statistics in greater detail, select a WLAN and click the Statistics button. For more information, see Viewing WLAN

Page 50

Network Setup4-57 3. Select a WLAN from the table displayed in the Statistics screen and click the Details button.The Details screen displays the WLAN

Page 51

Network Setup4-58 5. Refer to the Traffic field for the following information (both received and transmitted):6. Refer to the RF Status field for the

Page 52

Network Setup4-59 8. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something

Page 53

Network Setup4-60 • Undecr Pkts• RXPkts per sec• RX Tput (Mbps)• Avg Retries• Avg SNR (dB)• # Radios 3. Select any of the above listed parameters by c

Page 54

Network Setup4-61 3. Select a WLAN from the table displayed in the Statistics screen and click the Switch Statistics button.4. Refer to the Packet Rat

Page 55

Network Setup4-62 1. Select Network > Wireless LANs from the main menu tree.2. Click the WMM tab.The WMM tab displays the following information:Idx

Page 56

Network Setup4-63 3. Click the Edit button to display a screen used to modify existing WMM parameters. For more information, see Editing WMM Setting o

Page 57

OverviewThe RFS7000 switch is a centralized management solution for wireless networking. It connects to non-legacy access ports through L2 or L3 (L2

Page 58

Network Setup4-64 5. Click OK to save the updates to the QoS mappings.6. Select Cancel to close the screen without updating the configuration.DSCP to

Page 59

Network Setup4-65 4.5.3.1 Editing WMM SettingUse the WMM Edit screen to modify existing Access Category settings for the WLAN selected within the WMM

Page 60

Network Setup4-66 5. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something

Page 61

Network Setup4-67 • Conduct a NAC check for MU's connecting to the WLAN as well as perform an additional exclude function, by attaching an exclud

Page 62

Network Setup4-68 4.5.4.1 Adding an Include List to a WLANTo add a device to a WLAN’s include list configuration:1. Select Network > Wireless LANs

Page 63

Network Setup4-69 7. Refer to the Status field. It displays the current state of the requests made from the applet. Requests are any “SET/GET” operati

Page 64

Network Setup4-70 4.5.5 Configuring the NAC Exclusion ListThe switch provides a means to bypass NAC for 802.1x devices without a NAC agent. For Motoro

Page 65

Network Setup4-71 and 64 MAC entries maximum per list. For more information, see Configuring Devices on the Exclude List on page 4-71.5. The Configure

Page 66

Network Setup4-72 3. Click on the Add button within the List Configuration field.4. The List Name displays the read-only name of the list for which yo

Page 67

Network Setup4-73 3. Select a item from the Exclude List’s List Name field and click the Edit button (within the Configured WLANs field). 4. Map the s

Page 68

Overview1-2 Access ports do not have software or firmware upon initial receipt from the factory. When the access port is first powered on and cleared

Page 69

Network Setup4-74 2. Add a host entry to the include list. This adds a specified MAC entry/MAC range into the client’s include list.RFS7000(config-wir

Page 70

Network Setup4-75 RFS7000(config-wireless)#wlan 1 nac-server secondary radius-key my secret-2RFS7000(config-wireless)#3. MUs not NAC authenticated use

Page 71

Network Setup4-76 4.6 Viewing Associated MUsThe Mobile Units screen displays read-only device information for MUs interoperating with the switch manag

Page 72

Network Setup4-77 3. Click the Details button to launch a screen with additional information about the selected MU. For more information, see Viewing

Page 73 - 3.5 Switch File Management

Network Setup4-78 3. Select a MU from the table in the Status screen and click the Details button. 4. Refer to the following read-only MU’s transmit a

Page 74

Network Setup4-79 5. Click the Refresh button to update the MU Statistics to their latest values.6. Refer to the Status field for the current state of

Page 75

Network Setup4-80 3. Select the Last 30s checkbox to display MU statistics gathered over the last 30 seconds. This option is helpful for assessing MU

Page 76

Network Setup4-81 3. Select a MU from the table displayed in the Statistics screen and click the Details button. The Details screen displays statistic

Page 77 - 3.5.2 Viewing Files

Network Setup4-82 5. Refer to the Traffic field for the following information: 6. Refer to the RF Status field for the following information:7. Refer

Page 78

Network Setup4-83 3. Select a MU from the table displayed in the Statistics screen and click the Graph button. 4. Select a checkbox to display that me

Page 79

Overview1-3 1.1.1.3 Cabling RequirementsThe RFS7000 has four RJ-45 Gigabit Ethernet ports, four Gigabit SFP (fiber) ports, one out-of-band management

Page 80

Network Setup4-84 4.7 Viewing Access Port Radio InformationThe Access Port Radios screen displays a high-level overview of the APs created for use wit

Page 81 - Go button to move to

Network Setup4-85 2. Click the Configuration tab. 3. Refer to the table for the following information:Index Displays the numerical index (device ident

Page 82

Network Setup4-86 4. Select a radio index and refer to the Properties field for the following5. Click the Edit button to launch a screen used to confi

Page 83

Network Setup4-87 1. Select Network > Access Port Radios from the main menu tree. 2. Click the Configuration tab.3. Click the Global Settings butto

Page 84 - 3.8 Viewing Switch Licenses

Network Setup4-88 5. Enter the 802.1x Username assigned to the access port.6. Enter the 802.1x Password (for the corresponding username) providing aut

Page 85

Network Setup4-89 3. Select a radio to edit from the table.4. Click the Edit button to display a screen containing settings for the selected radio.5.

Page 86

Network Setup4-90 10. From within the Radio Settings field, define the Placement of the access port as either Indoors or Outdoors. An access port can

Page 87

Network Setup4-91 Adoption Preference IDDisplays the preference ID of the switch.The value can be set between 1 and 65535. To define the radios as pre

Page 88

Network Setup4-92 15. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somethin

Page 89

Network Setup4-93 Supported rates allow an 802.11 network to specify the data rate it supports. When a MU attempts to join the network, it checks the

Page 90 - 4.2.1 Configuring DNS

Overview1-4 1.1.2 System Status LED CodesThe RFS7000 has four vertically-stacked LEDs on its front panel. Each of the switch’s Gigabit Ethernet ports

Page 91

Network Setup4-94 3. Click the Add button to display a screen containing settings for adding a new radio4. Enter the device MAC Address (the physical

Page 92

Network Setup4-95 2. Click the Statistics tab.3. To define the time frame for the radio statistics, select either Last 30s or Last Hr above the statis

Page 93

Network Setup4-96 5. Select a radio from those displayed and click the Details button for additional radio information. For more information, see View

Page 94

Network Setup4-97 5. Refer to the Traffic field for the following information:6. Refer to the RF Status field for the following information:MAC Addres

Page 95

Network Setup4-98 7. Refer to the Errors field for the following information:8. Refer to the Status field for the current state of the requests made f

Page 96

Network Setup4-99 3. Select a radio index from the table displayed in the Statistics screen and click the Graph button. 4. Select a checkbox to displa

Page 97

Network Setup4-100 4. Select a radio from the table to view WLAN assignment information. The WLAN Assignment tab is divided into two fields; Select Ra

Page 98

Network Setup4-101 2. Click the WLAN Assignment tab.3. Select a radio from the table and click the Edit button. The Select Radio/BSS field displays th

Page 99

Network Setup4-102 WMM information displays per radio with the following information: 3. Use the Filter Options facility (by clicking the Show Filter

Page 100 - Network Setup

Network Setup4-103 4.7.4.1 Editing WMM SettingsUse the Edit screen to modify a WMM profile's properties (AIFSN, Tx Op, Cw Min and CW Max). Modify

Page 101

Overview1-5 Switch Status (Redundant System) Fan LED Temperature Status LED System Status 1 LED System Status 2 LED EventOff Off Power offGreen Solid

Page 102

Network Setup4-104 The CW Maximum is combined with the CW Minimum to define the Contention Window. From this range, a random number is selected for th

Page 103

Network Setup4-105 4.8 Viewing Access Port Adoption DefaultsUse the Access Port Adoption Defaults screen to configure radio adoption settings, assign

Page 104 - 2. Select the Statistics tab

Network Setup4-106 2. Select the Configuration tab.3. Refer to the following information as displayed within the Configuration tab:Type Displays wheth

Page 105

Network Setup4-107 4. To modify a radio’s adoption defaults, select a radio and click the Edit button. For more information, see Editing Default Radio

Page 106 - 2. Click the Details button

Network Setup4-108 4. Click the Edit button to display a screen to change the radio adoption default values for the selected radio type (either 802.11

Page 107

Network Setup4-109 9. Within the Radio Settings field, configure the Placement of the radio as either Indoors or Outdoors (using the Placement drop-do

Page 108

Network Setup4-110 Short Preambles only If using a 802.11bg radio, select this checkbox for the radio to transmit using a short preamble. Short preamb

Page 109 - 4.5.1 Configuring WLANs

Network Setup4-111 14. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somethi

Page 110

Network Setup4-112 Supported Rates allow an 802.11 network to specify the data rate it supports. When a station attempts to join the network, it check

Page 111

Network Setup4-113 3. The system administrator programs these options into the DHCP server. 4. If the access port finds the list, it sends a unidirect

Page 112

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol is a registered trademark of Symbol Technologies, Inc.

Page 113

Overview1-6 1.1.2.2 RJ-45 Gigabit Ethernet LEDs RJ-45 Port Speed LED RJ-45 Port Status LED 1.1.2.3 SFP Gigabit Ethernet LEDsPort Speed LED EventOff 10

Page 114

Network Setup4-114 2. Click the WLAN Assignment tab.The WLAN Assignment tab displays two fields: Select Radios/BSS and Select/Change Assigned WLANs.3.

Page 115

Network Setup4-115 6. Click Apply to save the changes made within the screen.7. Click Revert to cancel the changes made and revert back to the last sa

Page 116

Network Setup4-116 4. To modify the properties of WMM Adoption Settings, select a radio and click the Edit button. For more information, see Editing A

Page 117

Network Setup4-117 The Transmit Ops value is the maximum duration a device can transmit after obtaining a transmit opportunity. For Higher-priority tr

Page 118

Network Setup4-118 2. Click the Adopted AP tab. 3. Refer to the Adopted AP screen for the following information:4. Click the Export button to export t

Page 119 - Configuring 802.1x EAP

Network Setup4-119 5. Click the Convert to Sensor button to convert the selected adopted AP to a sensor that can be used with the Wireless Intrusion P

Page 120 - Configuring Kerboros

Network Setup4-120 3. Select an available index and click the Adopt button to display a screen wherein the properties of a new radio can be added for

Page 121 - Configuring Hotspots

Network Setup4-121 • Common Spanning (CST) – MST runs a single spanning tree instance (called the Common Spanning Tree) that interconnects all the bri

Page 122 - Switch Hotspot Redirection

Network Setup4-122 4.10.1 Configuring a Bridge Use the Bridge tab to configure the Bridge. This window displays bridge configuration details for the s

Page 123

Network Setup4-123 4. Refer to the General Configuration field for the followingMST Revision Level Assign a MST revision level number to the MST regio

Page 124

Overview1-7 SFP Port Speed LEDSFP Port Status LED1.1.2.4 Out of Band Management Port LEDsOut of Band Management Port Speed LEDOut of Band Management P

Page 125 - Configuring External Hotspot

Network Setup4-124 CIST Bridge HelloTime Set the CIST Hello Time (in seconds). After the defined interval all bridges in a bridged LAN exchange BPDUs.

Page 126

Network Setup4-125 4.10.2 Viewing and Configuring Bridge Instance DetailsThe Bride Instance tab displays the number of MST instance created and VLANS

Page 127 - Configuring Advanced Hotspot

Network Setup4-126 2. Select the Bridge Instance tab.3. Click the Add button. 4. Enter a value between 1 and 15 as the Instance ID.5. Click OK to save

Page 128

Network Setup4-127 2. Select the Port tabThe Port tab displays the following information (ensure you scroll to the right to view the numerous port var

Page 129

Network Setup4-128 OperPort PortFast Bpdu FilterDisplays a portfast BPDU filter for the oper port. The Spanning Tree Protocol sends BPDUs from all por

Page 130

Network Setup4-129 3. Select an Id and click the Edit button to revise the selected MST port configuration. For more information, see Editing a MST Po

Page 131

Network Setup4-130 4.10.3.1 Editing a MST Port ConfigurationTo edit and reconfigure MSTP Port parameters. 1. Select a row from the port table and clic

Page 132

Network Setup4-131 2. Click on OK button to save and commit the new configuration.3. Click Cancel to disregard the changes and revert back to the prev

Page 133

Network Setup4-132 2. Select the PortInstance tab.The Port Instance table displays the following:3. If necessary, select a CIST Index from the table a

Page 134

Network Setup4-133 4.10.4.1 Editing a Port Instance ConfigurationTo edit and reconfigure Port Instance parameters.1. Select a row from the port table

Page 135

Overview1-8 • Management Features• Security Features• Access Port Support1.2.1 Infrastructure FeaturesThe switch includes the following Infrastructure

Page 137 - Key 4 4041424344

Switch ServicesThis chapter describes the Services main menu information available for the following switch configuration activities.• Displaying th

Page 138

Switch Services5-2 5.1 Displaying the Services InterfaceRefer to the Services main menu interface to review a summary describing the availability of s

Page 139

Switch Services5-3 Redundancy Service Displays whether Redundancy is currently enabled or disabled. One or more switches can be configured as members

Page 140

Switch Services5-4 5.2 DHCP Server SettingsThe DHCP Server Settings screen displays tabs supporting the following configuration activities:• Configuri

Page 141 - 4.5.2 Viewing WLAN Statistics

Switch Services5-5 The DHCP Server screen displays with the Configuration tab displayed. 2. Select the Enable DHCP Server checkbox to enable the switc

Page 142

Switch Services5-6 8. Click the Add button to create a new DHCP pool. For more information, see Adding a New DHCP Pool on page 5-7. 9. Click the Optio

Page 143

Switch Services5-7 • Infinite - If selected, the client can use the assigned address indefinitely.• Actual Interval - Select this checkbox to manually

Page 144

Switch Services5-8 2. Click the Add button at the bottom of the screen. 3. Enter the name of the IP pool from which IP addresses can be issued to clie

Page 145

Switch Services5-9 Additionally, define the network IP Address and Subnet Mask used for DHCP discovery and requests between the DHCP Server and DHCP c

Page 146

Overview1-9 1.2.1.3 Configuration ManagementThe system supports redundant storage of configuration files to protect against corruption during a write

Page 147 - 4.5.3 Configuring WMM

Switch Services5-10 4. Name the option as appropriate, assign a Code (numerical identifier) and use the Typ e drop-down options to specify a value of

Page 148 - 2. Click the WMM tab

Switch Services5-11 5. Use the Automatic Update drop-down menu to specify whether the automatic update feature is on or off. Select Server update to e

Page 149

Switch Services5-12 4. Click the Edit button to modify the properties displayed on an existing DHCP pool. For more information, see Editing the Proper

Page 150

Switch Services5-13 2. Click the Excluded tab. The Excluded tab displays “fixed” IP addresses statically assigned and unavailable for assignment with

Page 151 - 4.5.3.1 Editing WMM Setting

Switch Services5-14 In the illustration above, a DHCP relay address has been configured on subnet 2 (The CLI equivalent is “ip helper-address <subn

Page 152

Switch Services5-15 3. Refer to the Interfaces field for the names of the interfaces available to route information between the DHCP Server and DHCP c

Page 153

Switch Services5-16 assignable IP addresses. DNS is a service, which maintains a database to map a given name to an IP address used for communication

Page 154

Switch Services5-17 2. Click the Bindings tab. 3. Refer to the contents of the Bindings tab for the following: 4. Click the Export button to display a

Page 155

Switch Services5-18 5.2.7 Reviewing DHCP Dynamic Bindings Dynamic DHCP bindings automatically map a hardware address to an IP address from a pool of a

Page 156

Switch Services5-19 5.2.8 Configuring DHCP User ClassThe DHCP server assigns IP addresses to clients based on user class option names. Clients with a

Page 157

Overview1-10 The log message format is similar to the format used by syslog messages (RFC 3164). Log messages include message severity, source (facili

Page 158

Switch Services5-20 5.2.8.1 Adding a New DHCP User Class NameA DHCP user class name can be configured with a maximum of 8 user class option values. To

Page 159

Switch Services5-21 3. Select an existing DHCP user class from the list and click the Edit button from the User Class Name field.a. The User Class Nam

Page 160

Switch Services5-22 5.2.9 Configuring DHCP Pool ClassThe DHCP server can associate multiple classes to each pool. Each class in a pool is assigned an

Page 161

Switch Services5-23 5.2.9.1 Editing an Existing DHCP Pool Class NameThe Edit Pool Class Configuration dialog is used to edit the association of a DHCP

Page 162 - 4.6 Viewing Associated MUs

Switch Services5-24 4. Use the Pool Name field to define a new pool name. Enter the pool name created using Adding a New DHCP Pool on page 5-7.5. Use

Page 163 - 4.6.1.1 Viewing MU Details

Switch Services5-25 2. Select the Configuration tab. 3. Refer to the Access Group field to define ACL IDs. An ACL ID must be created before it is sele

Page 164

Switch Services5-26 5. Click Apply to save changes to the screen. Navigating away from the screen without clicking the Apply button results in all the

Page 165 - 4.6.2 Viewing MU Statistics

Switch Services5-27 2. Select the Symmetric Keys tab. 3. Refer to the Symmetric Key screen to view the following information. 4. Select an existing Ke

Page 166

Switch Services5-28 2. Select the Symmetric Key tab. 3. Click the Add button.4. Enter a Key ID between 1-65534. The Key ID is a abbreviation allowing

Page 167

Switch Services5-29 2. Select the NTP Neighbor tab. 3. Refer to the following information (as displayed within the NTP Neighbor tab) to assess whether

Page 168

Overview1-11 • The switch can be configured to provide NTP services to NTP clients.• The switch can provide NTP support for user authentication.• Secu

Page 169

Switch Services5-30 6. Click the Add button to define a new peer or server configuration that can be added to the existing configurations displayed wi

Page 170

Switch Services5-31 (and switch) must be on the same subnet. NTP broadcasts reduce configuration complexity since both the switch and its NTP resource

Page 171

Switch Services5-32 2. Select the NTP Associations tab. 3. Refer to the following SNTP Association data for each SNTP association displayed: Address D

Page 172

Switch Services5-33 4. Select an existing NTP association and click the Details button to display additional information useful in discerning whether

Page 173 - Port Authentication

Switch Services5-34 5.3.6 Viewing NTP StatusRefer to the NTP Status tab to display performance (status) information relative to the switch’s current N

Page 174 - 4.7.1.2 Editing AP Settings

Switch Services5-35 5.4 Configuring Switch Redundancy Configuration and network monitoring are two tasks a network administrator faces as a network gr

Page 175

Switch Services5-36 switches at the same time. This is done by the cluster-protocol running on WS1, by duplicating the commands and sending them to th

Page 176

Switch Services5-37 To view status and membership data and define a redundancy group configuration, refer to the following:• Reviewing Redundancy Stat

Page 177

Switch Services5-38 Heartbeat Period The Heartbeat Period is the interval heartbeat messages are sent. Heartbeat messages discover the existence and s

Page 178 - Configuring Rate Settings

Switch Services5-39 3. Refer to the History field to view the current state of the redundancy group.4. Click Apply to save any changes to the screen.

Page 179 - 4.7.1.3 Adding APs

Overview1-12 The switch can be discovered using one of the following mechanisms:•DHCP• Switch fully qualified domain name (FQDN)• Static IP addresses

Page 180 - 4.7.2 Viewing AP Statistics

Switch Services5-40 3. Refer to the Status field to assess the current state of the redundancy group. Redundancy state is Displays the state of the re

Page 181

Switch Services5-41 4. The Apply and Revert buttons are unavailable for use with the Status screen, as there are no editable parameters to save or rev

Page 182 - 4.7.2.1 Viewing APs Details

Switch Services5-42 2. Select the Member tab.3. Refer to the following information within the Member tab:IP Address Displays the IP addresses of the s

Page 183

Switch Services5-43 4. Select a row, and click the Details button to display additional details for this member. For more information, see Displaying

Page 184 - 4.7.2.2 Viewing an AP’s Graph

Switch Services5-44 Status Displays the current status of this group member. This status could have the following values:• Configured - The member is

Page 185

Switch Services5-45 5. Refer to the Status field.The Status is the current state of the requests made from the applet. Requests are any “SET/GET” oper

Page 186

Switch Services5-46 • Do not allow different port speed/duplex settings on members. Each members should have the settings.• In a redundancy group of t

Page 187 - 4.7.4 Configuring WMM

Switch Services5-47 and ARP are tunneled through the home switch. The IP address for the MU is assigned from the VLAN to which the MU belongs (as dete

Page 188

Switch Services5-48 The Layer 3 Mobility screen appears with the Configuration tab displayed. 2. Select the Use Default Management Interface checkbox

Page 189 - 4.7.4.1 Editing WMM Settings

Switch Services5-49 5.5.2 Defining the Layer 3 Peer ListThe Layer 3 Peer List contains the IP addresses MUs are using to roam amongst various subnets.

Page 190

Overview1-13 1.2.2.3 Proxy-ARPProxy ARP is provided for MU's in PSP mode whose IP address is known. The WLAN generates an ARP reply on behalf of

Page 191

Switch Services5-50 Enter the IP addresses in the area provided and click the OK button to add the addresses to the list displayed within the Peer Lis

Page 192

Switch Services5-51 4. Click the Clear Statistics button to remove the data displayed for the selected peer IP address.5.5.4 Reviewing Layer 3 MU Stat

Page 193

Switch Services5-52 2. Select the MU Status tab. 3. Refer to the following information within the MU Status tab: MU MAC Displays the factory hardcoded

Page 194

Switch Services5-53 5.6 Configuring Self HealingThe switch supports a feature called Self Healing that enables radios to take corrective action when o

Page 195

Switch Services5-54 4. Click the Apply button to save the changes made within this screen. Clicking Apply overwrites the previous configuration.5. Cli

Page 196

Switch Services5-55 4. Highlight an existing neighbor and click the Edit button to launch a screen designed to modify the self healing action and/or n

Page 197

Switch Services5-56 3. Select an existing neighbor and click the Edit button. The radio index and description display in the upper right corner of the

Page 198

Switch Services5-57 5.7 Configuring Switch DiscoverySwitch discovery enables the SNMP discovery (location) of devices. To discover devices in the spec

Page 199

Switch Services5-58 2. Refer to the following information within the Discovery Profiles tab to discern whether an existing profile can be used as is,

Page 200

Switch Services5-59 If SNMP v3 is used with a discovering profile, a V3 Authentication screen displays. The User Name and Password are required to mat

Page 201 - 4.8.4 Configuring WMM

Overview1-14 1.2.2.5 IDM (Identity Driven Management) Radius authentication is performed for all protocols using a Radius-based authentication scheme

Page 202

Switch Services5-60 4. Refer to the Status field for an update of the edit process.The Status is the current state of the requests made from the apple

Page 203

Switch Services5-61 3. Refer to the following within the Recently Found Devices tab to discern whether a located device should be deleted from the lis

Page 204 - 2. Click the Adopted AP tab

Switch Services5-62 5.8 Configuring SOLE SupportThe switch has the ability to use Smart Opportunistic Location Engine (SOLE) adapters to assist in the

Page 205

Switch Services5-63 The Enabled column displays a green checkmark next to the SOLE adapter once enabled. A Red X defines the adapter as disabled.3. Cl

Page 206 - 4.10 Multiple Spanning Tree

Switch Services5-64 5.8.3 Reviewing SOLE StatisticsPeriodically review SOLE statistics to determine the extent of the message traffic transmitted and

Page 207

Switch SecurityThis chapter describes the security mechanisms available to the switch. This chapter describes the following security configuration a

Page 208 - 4.10.1 Configuring a Bridge

Switch Security6-2 6.1 Displaying the Main Security InterfaceRefer to main Security interface for a high level overview of device intrusion and switch

Page 209

Switch Security6-3 2. Refer to the following information to discern if configuration changes are warranted: The Apply and Revert buttons are greyed ou

Page 210

Switch Security6-4 6.2 AP Intrusion DetectionUse the Access Point Detection menu options to view and configure network related IP information. The Acc

Page 211

Switch Security6-5 4. Refer to the MU Assisted Scan field to enable associated MUs to assist in the detection of access points. 5. Click the Apply but

Page 212 - 4.10.3 Configuring a Port

Overview1-15 Detector APsConfigure an AP in either – Data mode (the regular mode) or Detector mode.In Detector mode, the AP scans all channels at a co

Page 213 - 2. Select the Port tab

Switch Security6-6 6.2.1.1 Adding or Editing an Allowed APTo add a new range or modify the address range used to designate devices as Allowed APs:1. S

Page 214

Switch Security6-7 6.2.2 Approved APs (Reported by APs)Those access points detected and approved for operation within the switch managed network can b

Page 215

Switch Security6-8 5. Click on the Export button to export the contents of the table to a Comma Separated Values file (CSV).6.2.3 Unapproved APs (Repo

Page 216

Switch Security6-9 4. The Number of Unapproved APs is simply the sum of all of Unapproved Radio MAC Addresses detected. 5. If a Radio MAC address is l

Page 217

Switch Security6-10 3. The Unapproved APs (Reported by MUs) table displays the following information:4. The Number of Unapproved APs is simply the sum

Page 218

Switch Security6-11 2. Click the Configuration tab. 3. Within the Collection Settings field, set the Detection Window interval (in seconds) the switch

Page 219

Switch Security6-12 5. When using the Frames with known bad ESSIDs violation parameter it is necessary to enter a list of known bad ESSIDs for the vio

Page 220

Switch Security6-13 3. Select a detected MU and click the Delete button to remove it from the list of MUs you are tracking as potential threats within

Page 221 - Switch Services

Switch Security6-14 6.4 Configuring Wireless FiltersUse filters to either allow or deny a MAC address (or groups of MAC addresses) from associating wi

Page 222

Switch Security6-15 3. Refer to the Associated WLANs field for following4. If the properties of an existing filter are close to your needs but still r

Page 223

About this GuideIntroductionThis guide provides information about using the RFS7000 Series RF Switch. Documentation SetThe documentation set for the R

Page 224 - 5.2 DHCP Server Settings

Overview1-16 MU Balancing Across Multiple APsAs per the 802.11 standard, AP and MU association is a process conducted independently of the switch. 802

Page 225

Switch Security6-16 The user can modify an ACL Index (numerical identifier) for the ACL, and edit the starting an ending MAC address range for the dev

Page 226

Switch Security6-17 Define an Index (numerical identifier) for the ACL and the starting and ending MAC address range for devices allowed/denied access

Page 227

Switch Security6-18 4. Select the box to the right of each WLAN you want associated with the ACL.Selecting a WLAN maps it the MAC address range and al

Page 228

Switch Security6-19 6.5 ACL ConfigurationAn Access Control List (ACL) is a sequential collection of permit and deny conditions that apply to switch da

Page 229

Switch Security6-20 For more information, see:• Router ACLs• Port ACLs• Wireless LAN ACLs• ACL Actions6.5.1.1 Router ACLsRouter ACLs are applied to La

Page 230

Switch Security6-21 6.5.1.2 Port ACLsThe switch supports Port ACLs on physical interfaces and inbound traffic only. The following Port ACLs are suppor

Page 231

Switch Security6-22 6.5.1.5 Precedence OrderThe rules within an ACL are applied to packets based on their precedence values. Every rule has a unique p

Page 232

Switch Security6-23 The ACLs field displays the list of ACLs currently associated with the switch. An ACL contains an ordered list of ACEs. Each ACE s

Page 233

Switch Security6-24 3. Click on the Add button.4. Select an ACL Type from the drop-down menu. The following options are available:• Standard IP List –

Page 234

Switch Security6-25 3. Click the Add button within the Associated Rules field. 4. Use the Precedence field to enter a precedence (priority) value betw

Page 235 - 5.2.5 Viewing DDNS Bindings

Overview1-17 PMKs among themselves. This allows an MU to roam to an AP that it has not previously visited and reuse a PMK from another AP to skip the

Page 236 - 5.2.6 Viewing DHCP Bindings

Switch Security6-26 9. If the selected Protocol is tcp or udp, click the Protocol Options button to configure the source and destination Port. 10. Use

Page 237 - 2. Click the Bindings tab

Switch Security6-27 The rules within an ACL are applied to packets based on their precedence value. Rules with lower precedence are always applied fir

Page 238

Switch Security6-28 2. Click the Attach-L2/L3 tab.3. Refer to the following information as displayed within the Attach - L2/L3 tab:4. Select an interf

Page 239

Switch Security6-29 3. Click on the Add button.4. Use the Interface drop-down menu to select the interface to configure on the switch. Available optio

Page 240

Switch Security6-30 6.5.4 Attaching an ACL on a WLAN Interface/PortUse the Attach-WLAN tab to view and assign an ACL to a WLAN on the switch. By defau

Page 241

Switch Security6-31 6.5.4.1 Adding or Editing a New ACL WLAN ConfigurationAfter creating an ACL, it can be applied to one or more WLANs on the switch.

Page 242

Switch Security6-32 2. Click the Statistics tab.3. Refer to the following information as displayed within the Statistics tab:4. Select an interface an

Page 243

Switch Security6-33 6.6 Configuring NAT InformationNetwork Address Translation (NAT) provides the translation of an Internet Protocol (IP) address wit

Page 244 - 5.3 Configuring Secure NTP

Switch Security6-34 2. Click on the Dynamic Translation tab. 3. Refer to the following information as displayed within the Dynamic Translation tab. Ty

Page 245

Switch Security6-35 4. Select an existing NAT configuration and click the Edit button to modify the settings of this existing NAT configuration. The f

Page 246

Overview1-18 802.11e QoS 802.11e enables real-time audio and video streams to be assigned a higher priority over regular data. The switch supports the

Page 247

Switch Security6-36 back to the specific internal private class IP address in order to reach the LAN over the switch managed network. 6. Use the Acces

Page 248

Switch Security6-37 3. Refer to the following information as displayed within the Static Translation tab. 4. Select an existing NAT configuration and

Page 249

Switch Security6-38 6.6.2.1 Adding a New Static NAT ConfigurationIf the existing NAT configurations displayed with the Configuration prove unsuitable

Page 250 - 5.3.4 Adding an NTP Neighbor

Switch Security6-39 9. Enter the Global Address to assign to a host in the outside network. This should be interpreted as a secure address.10. Display

Page 251

Switch Security6-40 3. Refer to the following information as displayed within the Interface tab: 4. To Edit an existing interface, select it from the

Page 252

Switch Security6-41 6.6.4 Viewing NAT StatusUse the Status tab to review the NAT translations configured thus far for the switch. The Status tab displ

Page 253

Switch Security6-42 6.7 Configuring IKE SettingsIKE (also known as ISAKMP) is the negotiation protocol enabling two hosts to agree on how to build an

Page 254 - 5.3.6 Viewing NTP Status

Switch Security6-43 2. Click the Configurations tab.During IKE negotiations, peers must identify themselves to one another. Thus, the configuration yo

Page 255

Switch Security6-44 8. Select an existing entry and click the Delete button to remove it.9. If the properties of an existing peer IP address, key and

Page 256

Switch Security6-45 A IKE policy matches when they have the same encryption, hash, authentication and Diffie-Hellman settings. The SA lifetime must al

Page 257

Overview1-19 1.2.2.14 Automatic Channel SelectionAutomatic channel selection works as follows:1. When a new AP is adopted, it scans each channel. Howe

Page 258

Switch Security6-46 4. Highlight an existing policy and click the Edit button to revise the policy’s existing priority, encryption scheme, hash value,

Page 259

Switch Security6-47 a. Configure a set of attributes for the new IKE policy: b. Refer to the Status field for the current state of the requests made f

Page 260

Switch Security6-48 2. Click the SA Statistics tab.3. Refer to the information displayed within SA Statistics tab to discern the following: Index Disp

Page 261

Switch Security6-49 4. Select an index and click the Details button to display a more robust set of statistics for the selected index. Use this inform

Page 262 - 2. Select the Member tab

Switch Security6-50 security association, allows encryption keys to change during IPSec sessions and permits Certification Authority (CA) support for

Page 263

Switch Security6-51 6.8.1 Defining the IPSec ConfigurationUse the IPSec VPN Configuration tab to view the attributes of existing VPN tunnels and modif

Page 264

Switch Security6-52 4. Refer to the Transform Sets field to view the following data: 5. Select an IPSec VPN transform set (by its index) and click the

Page 265

Switch Security6-53 4. Revise the following information as required to render the existing transform set useful. Name The name is read-only and cannot

Page 266 - 5.5 Layer 3 Mobility

Switch Security6-54 5. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somethi

Page 267

Switch Security6-55 5. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somethi

Page 268

Overview1-20 • Unicast From Mobile Unit – Frames are decrypted, converted from 802.11 to 802.3 and switched to the wired side of the VLAN dynamically

Page 269

Switch Security6-56 2. Click the Remote tab.3. Refer to the Configuration field to define the following: 4. Click the IP Range tab to view the followi

Page 270

Switch Security6-57 7. To add a new range of IP addresses, click the Add button (within the IP Range tab) and define the range in the fields provided.

Page 271

Switch Security6-58 radio button) or if no authentication is used for credential verification (by selecting the No Authentication radio button).4. Ent

Page 272 - 2. Select the MU Status tab

Switch Security6-59 10. Click the Add button to display a screen used to add a new User and Password. Enter a User Name and Password and confirm. Clic

Page 273 - 5.6 Configuring Self Healing

Switch Security6-60 2. Click the Crypto Maps tab.The Crypto Maps screen is divided into 5 tabs, each serving a different function in the overall Crypt

Page 274

Switch Security6-61 4. Select an existing Crypto Map and click the Edit button to modify the Crypto Map’s attributes. If an entire Crypto Map requires

Page 275

Switch Security6-62 c. Use the None, Domain Name or Host Name radio buttons to select and enter the fully qualified domain or host name of the host ex

Page 276

Switch Security6-63 2. Click the Crypto Maps tab and select Peers. 3. Refer to the read-only information displayed within the Peers tab to determine w

Page 277

Switch Security6-64 6. If a new peer requires creation, click the Add button. a. Define the Seq # /Name for the new peer. b. Enter the name of the IKE

Page 278

Switch Security6-65 3. Refer to the read-only information displayed within the Manual SAs tab to determine whether a Crypto Map with a manually define

Page 279

Overview1-21 1.2.3 Wired SwitchingThe switch includes the following wired switching features:• DHCP Servers • DDNS • VLAN Enhancements• Interface Mana

Page 280

Switch Security6-66 d. Use the ACL ID drop-down menu to permit a Crypto Map data flow using the permissions within the selected ACL.e. Select either t

Page 281

Switch Security6-67 3. Refer to the read-only information displayed within the Transform Sets tab to determine whether a Crypto Map transform set requ

Page 282 - 5.8 Configuring SOLE Support

Switch Security6-68 2. Click the Crypto Maps tab and select Interfaces. 3. Refer to the following read-only information displayed within the Interface

Page 283 - 5.8.2 Viewing SOLE Adapters

Switch Security6-69 6.8.5 Viewing IPSec Security AssociationsRefer to the IPSec SAs tab to review the various security associations (SAs) between the

Page 284

Switch Security6-70 4. Use the page navigation facility (found on top of the table next to the Show Filtering Options link) to view the list of securi

Page 285 - Switch Security

Switch Security6-71 6.9 Configuring the Radius ServerRemote Authentication Dial-In User Service (Radius) is a client/server protocol and software enab

Page 286

Switch Security6-72 • PEAP and GTC• PEAP and MSCHAPv2Apart from EAP authentication, the switch allows the enforcement of user-based policies. User-bas

Page 287

Switch Security6-73 6.9.1.2 Authentication of Terminal/Management User(s)The local Radius server can be used to authenticate users. A normal user (wit

Page 288 - 6.2 AP Intrusion Detection

Switch Security6-74 authentication source if a user does not exist in the local Server’s database, since the primary method has rejected the authentic

Page 289

Switch Security6-75 7. Click the Revert button to cancel any changes made within the Global Settings field and revert back to the last saved configura

Page 290

Overview1-22 1.2.3.4 Interface Management The switch permits a physical interface to Auto Negotiate, Full Duplex or Half Duplex. The switch also allow

Page 291

Switch Security6-76 6.9.3.2 Radius Proxy Server ConfigurationThe switch can send Radius requests to a properly configured proxy Radius server. A user&

Page 292

Switch Security6-77 6.9.4 Configuring Radius Authentication and AccountingDeploy one or more Radius servers to configure user authentication, EAP type

Page 293

Switch Security6-78 4. Refer to the LDAP Server Details field to define the primary and secondary Radius LDAP server configuration providing access to

Page 294 - 6.3 MU Intrusion Detection

Switch Security6-79 6. Click the Revert button to cancel any changes made within the screen and revert back to the last saved configuration.6.9.5 Conf

Page 295

Switch Security6-80 If the group assignment is insufficient, use the Edit or Add functions to modify/create users or modify their existing group assig

Page 296 - 6.3.2 Viewing Filtered MUs

Switch Security6-81 a. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somethi

Page 297

Switch Security6-82 6.9.6 Configuring Radius User GroupsThe Groups tab displays a list of all groups in the local Radius server's database. The g

Page 298

Switch Security6-83 4. Refer to the WLANs Assigned area of the Groups tab to review which switch WLANs are available for use with configured groups.5.

Page 299

Switch Security6-84 a. Refer to the Status field for the current state of requests made from applet. This field displays error messages if something g

Page 300

Switch Security6-85 6.9.7 Viewing Radius Accounting LogsAccounting logs contain information about the use of remote access services by users. This inf

Page 301

Overview1-23 • Certificate Management1.2.5.1 Encryption and AuthenticationWEP Wired Equivalent Privacy (WEP) is an encryption scheme used to secure wi

Page 302

Switch Security6-86 6.10 Creating Server CertificatesUse the Server Certificates screen to view existing self-signed certificate values. The values di

Page 303 - 6.5 ACL Configuration

Switch Security6-87 2. Select the Trustpoints tab.A panel (on the far left of the screen) displays currently enrolled trustpoints.The Server Certifica

Page 304 - 6.5.1.1 Router ACLs

Switch Security6-88 3. Click the Certificate Wizard button to create a self signed certificate, upload an external server certificate (and/or a root c

Page 305 - 6.5.1.4 ACL Actions

Switch Security6-89 Using the Wizard to Create a New CertificateTo generate a new self-signed certificate or prepare a certificate request:1. Select t

Page 306 - 6.5.2 Configuring an ACL

Switch Security6-90 Select a trustpoint for the new certificate.• Use existing trustpoint - Select an existing trustpoint from the drop-down menu.• Cr

Page 307 - 6.5.2.1 Adding a New ACL

Switch Security6-91 If generating a new self-signed certificate (as selected in page 2 of the wizard), the wizard continues the installation. Use the

Page 308 - 6.5.2.2 Adding a New ACL Rule

Switch Security6-92 7. Select the Enroll the trustpoint checkbox to enroll the certificate request with the CA. 8. Click Next to proceed with the cert

Page 309

Switch Security6-93 11. Click the Next button to continue preparing the certificate request.Using the Wizard Delete OperationThe wizard can also be us

Page 310

Switch Security6-94 6.10.2 Configuring Trustpoint Associated KeysTrustpoint keys allow a user to use different Rivest, Shamir, an Adelman (RSA) key pa

Page 311

Switch Security6-95 6.10.2.1 Adding a New KeyIf none of the keys listed within the Keys tab are suitable for use with a certificate, consider creating

Page 312

Overview1-24 802.1x EAP802.1x EAP is the most secure authentication mechanism for wireless networks and includes EAP-TLS, EAP-TTLS and PEAP. The switc

Page 313

Switch Security6-96 The drop-down menu contains the log files listed within the Server Certificate screen.6. Use the To drop-down menu to define wheth

Page 314

Switch Security6-97 When enabling an Enhanced Beacon, the switch allows adopted access ports to periodically scan for rogue APs on different channels

Page 315

Switch Security6-98 4. Use Scan Interval value to enter the interval used by the radio between scans. The radio scans each channel for the defined int

Page 316 - 2. Click the Statistics tab

Switch Security6-99 9. Click Apply to save changes to the screen. Navigating away from the screen without clicking the Apply button results in changes

Page 317

Switch Security6-100 4. Define a Window Time (from 10 to 60 seconds) to set an interval used by the AP to record MU probe requests. The MU radio probe

Page 318

Switch Security6-101 2. Select the Beacons Found tab.3. Refer to the following information as displayed within the Beacons Found tab. 4. Click the Cle

Page 319

Switch Security6-102 6.11.4 Reviewing the Probes Report Refer to the Probes Found tab to view the enhanced Probe report created by the switch. The tab

Page 320

Switch ManagementThis chapter describes the Management Access main menu items used to configure the switch. This chapter consists of the following s

Page 321

Switch Management7-2 7.1 Displaying the Management Access InterfaceRefer to the main Management Access interface for a high-level overview of the curr

Page 322

Switch Management7-3 7.2 Configuring Access ControlRefer to the Access Control screen to allow/deny management access to the switch using the differen

Page 323

Overview1-25 When you initially switch packets on an out-of-the-box AP300 port, it immediately attempts to authenticate using 802.1x. Since 802.1x sup

Page 324

Switch Management7-4 3. Click the Apply button to save changes made to the screen since the last saved configuration.RetriesDefine the number of retri

Page 325 - 6.6.4 Viewing NAT Status

Switch Management7-5 4. Click the Revert button to revert the screen back to its last saved configuration. Changes made since the contents of the scre

Page 326 - 6.7 Configuring IKE Settings

Switch Management7-6 1. Select Management Access > SNMP Access > v1/v2 from the main menu tree. 2. Refer to the Community Name and Access Contro

Page 327

Switch Management7-7 2. Select an existing Community Name from those listed and click the Edit button. 3. Modify the Community Name used to associate

Page 328 - 6.7.2 Setting IKE Policies

Switch Management7-8 2. Select the V3 tab from within the SNMP Access screen. 3. Refer to the fields within the V3 screen for the following informatio

Page 329

Switch Management7-9 7.3.2.1 Editing a SNMP v3 Authentication and Privacy PasswordThe Edit screen enables the user to modify the password required to

Page 330

Switch Management7-10 2. Select the Statistics tab from within the SNMP Access screen.3. Refer to the following read-only statistics displayed within

Page 331 - 6.7.3 Viewing SA Statistics

Switch Management7-11 7.4 Configuring SNMP TrapsUse the SNMP Trap Configuration screen to enable or disable individual traps or by functional trap gro

Page 332

Switch Management7-12 Redundancy Displays a list of sub-items (trap options) specific to the Redundancy (clustering) configuration option. Select an i

Page 333 - 6.8 Configuring IPSec VPN

Switch Management7-13 5. Click the Expand All Items button to display the sub-items within each trap category. Use this item to display every trap tha

Page 334

iv RFS7000 Series Switch System Reference GuideNotational ConventionsThe following additional notational conventions are used in this document:•Italic

Page 335

Overview1-26 1.2.5.9 Rogue AP DetectionThe switch supports the following rogue AP detection mechanisms:• Motorola RFMS Support• RF scan by Access Port

Page 336

Switch Management7-14 2. Click the Wireless Statistics Thresholds tab. 3. Refer to the following information for thresholds descriptions, conditions,

Page 337

Switch Management7-15 4. Select a threshold and click the Edit button to display a screen wherein threshold settings for the MU, AP and WLAN can be mo

Page 338

Switch Management7-16 2 Throughput Greater than A decimal number greater than 0.00 and less than or equal to 100000.00A decimal number greater than 0.

Page 339

Switch Management7-17 7.5 Configuring SNMP Trap ReceiversRefer to the Trap Receivers screen to review the attributes of existing SNMP trap receivers (

Page 340

Switch Management7-18 Remove Trap Receivers as needed if the destination address information is no longer available on the system.5. Click the Add but

Page 341

Switch Management7-19 7.5.2 Adding SNMP Trap ReceiversThe SNMP Add screen is designed to create a new SNMP trap receiver. Use the Add screen to create

Page 342

Switch Management7-20 7.6 Configuring Management UsersRefer to the Users screen to view the administrative privileges assigned to different switch use

Page 343 - 6.8.4 Configuring Crypto Maps

Switch Management7-21 4. Click on the Edit button to modify the associated roles and access modes of the selected user. By default, the switch has two

Page 344 - 6.8.4.1 Crypto Map Entries

Switch Management7-22 6. Select the access modes to assign to the new user from the options provided in the Access Modes panel. Select one or more of

Page 345

Switch Management7-23 4. Enter the new authentication password for the user in the Password field and reconfirm within the Confirm Password field.5. S

Page 346 - 6.8.4.2 Crypto Map Peers

Overview1-27 Authorized AP Lists Configure a list of authorized access ports based on their MAC addresses. The switch evaluates the APs against the co

Page 347

Switch Management7-24 7.6.1.3 Creating a Guest Admin and Guest UserOptionally, create a guest administrator for creating guest users with specific use

Page 348 - 6.8.4.3 Crypto Map Manual SAs

Switch Management7-25 6. Add guest users by name, start date and time, expiry date and time and user group.7. Optionally, click the Generate button t

Page 349

Switch Management7-26 2. Select the Authentication tab. 3. Refer to the Authentication methods field to set a preferred and alternative authentication

Page 350

Switch Management7-27 7. Select a Radius server from the table and click the Edit button to modify how the authentication method is used. For more inf

Page 351 - 6.8.4.5 Crypto Map Interfaces

Switch Management7-28 5. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somet

Page 352

Switch Management7-29 5. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if somet

Page 353

Switch Management7-30

Page 354

DiagnosticsThis chapter describes the various diagnostic features available for monitoring switch performance. This chapter consists of the followin

Page 355 - 6.9.1 Radius Overview

Diagnostics8-2 8.1 Displaying the Main Diagnostic InterfaceUse the main diagnostic screen to monitor the following switch features:• Switch Environmen

Page 356 - 6.9.1.1 User Database

Diagnostics8-3 3. The Environment displays the following fields:• Settings• Temperature Sensors•Fans4. In the Settings field, select the Enable Diagno

Page 357 - 6.9.1.6 Accounting

Overview1-28 • Site-Site VPN — For example, a company branching office traffic to another branch office traffic with an unsecured link between the two

Page 358

Diagnostics8-4 2. Select the CPU tab. 3. The CPU screen consists of 2 fields:• Load Limits•CPU Usage4. The Load Limits field displays the maximum CPU

Page 359

Diagnostics8-5 8.1.3 Switch Memory AllocationUse the Memory tab to periodically assess the switch’s CPU load. 1. Select Diagnostics from the main tree

Page 360

Diagnostics8-6 5. The Buffers field displays buffer usage information. It consists of a table with the following information:6. Click the Apply button

Page 361

Diagnostics8-7 8.1.5 Switch Memory ProcessesThe Processes tab displays the number of processes in use and percentage of memory usage limit per process

Page 362

Diagnostics8-8 8.1.6 Other Switch ResourcesThe Other Resources tab displays the memory allocation of Packet Buffer, IP Route Cache and File Descriptor

Page 363

Diagnostics8-9 8.2 Configuring System LoggingUse the System Logging screen for logging system events. Its important to log individual switch events to

Page 364

Diagnostics8-10 6. Select the Enable Logging to Syslog Server checkbox to enable the switch to log system events send them to an external syslog serve

Page 365

Diagnostics8-11 2. Select the File Mgmt tab. 3. The File Mgmt tab displays existing log files. Refer to the following for log file details:4. Highligh

Page 366

Diagnostics8-12 7. Click the Transfer Files button to display a sub-screen wherein log files can be sent to an external location (defined by you) usin

Page 367

Diagnostics8-13 4. Refer to the Status field for the current state of the requests made from applet. This field displays error messages if something g

Page 368

Overview1-29 • TCP Bad Sequence number Apart from detecting the above attacks, the firewall also performs sanity checks on every packet. These sanity

Page 369

Diagnostics8-14 8.2.2.2 Transferring Log Files If a system log contains data that may require archiving, consider using the Transfer Files screen to e

Page 370

Diagnostics8-15 8.3 Reviewing Core SnapshotsUse the Core Snapshots screen to view the core snapshots (system events and process failures with a .core

Page 371

Diagnostics8-16 8.3.1 Transferring Core SnapshotsUse the Transfer screen to define a source for transferring core snapshot files to a secure location

Page 372

Diagnostics8-17 8.4 Reviewing Panic SnapshotsRefer to the Panic Snapshots screen for an overview of the panic files available. Typically, panic files

Page 373

Diagnostics8-18 6. Click the Transfer button to open the transfer dialogue to transfer the file to another location. For more information, see Transfe

Page 374

Diagnostics8-19 6. Provide the name of the file to be transferred to the location specified within the File field. 7. If Server has been selected as t

Page 375

Diagnostics8-20 • Send log message to a file.• Use SNMP v2 only.• Message severity.• What kinds of messages should be seen.3. Select the Send log mess

Page 376

Diagnostics8-21 1. Select Diagnostics > Ping from the main menu. 2. Refer to the following information displayed within the Configuration tab: 3. T

Page 377

Diagnostics8-22 8.6.1 Modifying the Configuration of an Existing Ping TestThe properties of an existing ping tests can be modified to ping an existing

Page 378

Diagnostics8-23 8.6.2 Adding a New Ping TestIf the attributes of an existing ping test do not satisfy the requirements of a new connection test, and y

Page 379 - 6.10.2.2 Transferring Keys

Overview1-30 1.2.5.16 NACThere is an increasing proliferation of insecure devices (laptops, mobile computers, PDA, smart-phones) accessing WiFi networ

Page 380

Diagnostics8-24 4. Click OK to save and add the changes to the running configuration and close the dialog.5. Refer to the Status field for the current

Page 381

Diagnostics8-25 Min RTT Displays the quickest round trip time for ping packets transmitted from the switch to its destination IP address. This may ref

Page 382

Diagnostics8-26

Page 383

Appendix ACustomer SupportMotorola’s Enterprise Mobility Support CenterIf you have a problem with your equipment, contact Enterprise Mobility support

Page 384

A - 2 RFS7000 Series Switch System Reference Guide

Page 385

Appendix BAdaptive APB.1 Adaptive AP OverviewAn adaptive AP (AAP) is an AP-51XX access point that can adopt like an AP300 (L3). The management of an A

Page 386

B - 2 RFS7000 Series Switch System Reference GuideB.1.1 Where to Go From HereRefer to the following for a further understanding of AAP operation:• “B.

Page 387 - Switch Management

Appendix B: Adaptive AP B - 3B.1.3 Types of Adaptive APsTwo low priced AP-5131 SKU configurations are being introduced allowing customers to take adva

Page 388

B - 4 RFS7000 Series Switch System Reference GuideB.1.5 Switch DiscoveryFor an AP-51XX to function as an AAP (regardless of mode), it needs to connect

Page 389

Appendix B: Adaptive AP B - 5** The AP-51xx uses an encryption key to hash passphrases and security keys. To obtain the encryption passphrase, configu

Page 390

Switch Web UI Access& Image Upgrades2.1 Accessing the Switch Web UI2.1.1 Web UI RequirementsThe switch Web UI is accessed using Internet Explore

Page 391 - 7.3 Configuring SNMP Access

B - 6 RFS7000 Series Switch System Reference GuideB.1.7 Adaptive AP WLAN TopologyAn AAP can be deployed in the following WLAN topologies: • Extended W

Page 392

Appendix B: Adaptive AP B - 7B.1.11 Remote Site Survivability (RSS)RSS can be used to turn off RF activity on an AAP if it loses adoption (connection)

Page 393

B - 8 RFS7000 Series Switch System Reference GuideB.2 Supported Adaptive AP TopologiesThe following AAP topologies are supported with the RFS7000:• “B

Page 394

Appendix B: Adaptive AP B - 9B.2.1 Topology Deployment ConsiderationsWhen reviewing the AAP topologies describes in the section, be cognizant of the f

Page 395

B - 10 RFS7000 Series Switch System Reference GuideB.2.4 Extended VLAN with Mesh NetworkingMesh networking is an extension of the existing wired netwo

Page 396

Appendix B: Adaptive AP B - 11To avoid a lengthy broken connection with the switch, Motorola recommends generating an SNMP trap when the AAP loses ado

Page 397 - 7.4 Configuring SNMP Traps

B - 12 RFS7000 Series Switch System Reference GuideB.4.1 Adaptive AP ConfigurationAn AAP can be manually adopted by the switch, adopted using a config

Page 398

Appendix B: Adaptive AP B - 135. Select the Enable AP-Switch Tunnel option to allow AAP configuration data to reach a switch using a secure VPN tunnel

Page 399

B - 14 RFS7000 Series Switch System Reference Guide3. Ensure the Adopt unconfigured radios automatically option is NOT selected.When disabled, there i

Page 400

Appendix B: Adaptive AP B - 15 NOTE Additionally, a WLAN can be defined as independent using the "wlan <index> independent" command fr

Page 401

Installing the System Iamge2-2 2.1.2 Connecting to the Switch Web UITo display the Web UI, launch a Web browser on a computer with the capability of a

Page 402

B - 16 RFS7000 Series Switch System Reference GuideOnce an AAP is adopted by the switch, it displays within the switch Access Port Radios screen (unde

Page 403

Appendix B: Adaptive AP B - 17B.4.4. Sample Switch Configuration File for IPSec and Independent WLANThe following constitutes a sample RFS7000 switch

Page 404

B - 18 RFS7000 Series Switch System Reference Guide!ip http server ip http secure-trustpoint default-trustpoint ip http secure-server ip ssh no servic

Page 405

Appendix B: Adaptive AP B - 19radio 1 rss enable radio add 2 00-15-70-00-79-30 11a aap5131 radio 2 bss 1 5 radio 2 bss 2 1 radio 2 bss 3 2 radio 2 cha

Page 406 - 7.6.1 Configuring Local Users

B - 20 RFS7000 Series Switch System Reference Guideswitchport trunk allowed vlan add 1-9,100,110,120,130,140,150,160,170, switchport trunk allowed vla

Page 408

MOTOROLA INC.1303 E. ALGONQUIN ROADSCHAUMBURG, IL 60196http://www.motorola.com72E-103889-01 Revision AJanuary 2008

Page 409

Switch Web UI Access & Image Upgrades2-3 switch, view the status of the switch’s Ethernet connections and view switch CPU and memory utilization s

Page 410

Installing the System Iamge2-4

Page 411

Switch InformationThis chapter describes the Switch main menu information used to configure the RFS7000. This chapter consists of the following sect

Page 412

ContentsChapter 1. OverviewHardware Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Ph

Page 413

Switch Information3-2 Refer to the switch configuration tab for:• Viewing the Switch Configuration• Viewing Switch Statistics 3.1.1 Viewing the Switch

Page 414

Switch Information3-3 2. Select the Configuration tab 3. The system prompts the user for the correct Country code after the first login.A warning mess

Page 415

Switch Information3-4 5. Click the Restart button to reboot the switch. The switch itself does not include a hardware feature for this purpose. 6. Cli

Page 416

Switch Information3-5 The Dashboard screen displays the current health of the switch and is divided into the following fields: •Alarms• Ports• Environ

Page 417 - Diagnostics

Switch Information3-6 1. Refer to the Alarms field for details of all the unacknowledged alarms generated during the past 48 hours. The alarms are cla

Page 418 - 8.1.1 Switch Environment

Switch Information3-7 2. Click the Switch Statistics tab at the top of the Switch screen.3. Refer to the following read-only information about associa

Page 419 - 8.1.2 CPU Performance

Switch Information3-8 6. Refer to the Errors field for the following read-only packet error and loss information for associated access ports and radio

Page 420

Switch Information3-9 2. Select the Configuration tab to display the following read-only information: 3. Select a port and click the Edit button to mo

Page 421

Switch Information3-10 3.2.1.1 Editing the Port ConfigurationTo modify the port configuration:1. Select a port from the table displayed within the Con

Page 422 - 8.1.4 Switch Disk Allocation

Switch Information3-11 Read-only details about the port’s cabling connection also display within the Edit screen. This information should be used to h

Page 423 - 8.1.5 Switch Memory Processes

vi RFS7000 Series Switch System Reference GuidePower Save Polling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Page 424 - 8.1.6 Other Switch Resources

Switch Information3-12 3.2.3 Viewing the Ports StatisticsThe Statistics tab displays read-only statistics for uplink and downlink ports. Use this info

Page 425 - 8.2.1 Log Options

Switch Information3-13 4. Select a port and click on Details button to see the detailed port statistics. For more information, refer to Detailed Port

Page 426 - 8.2.2 File Management

Switch Information3-14 4. The Status is the current state of the requests made from the applet. Requests are any “SET/GET” operation from the applet.

Page 427

Switch Information3-15 3.2.3.2 Viewing the Port Statistics GraphThe switch continuously collects data for port statistics. Even when the port statisti

Page 428

Switch Information3-16 4. Click on the Close button to exit the screen without saving changes.3.3 Viewing Switch ConfigurationsUse the Configurations

Page 429

Switch Information3-17 2. To view the entire contents of a config file (in detail), select a config file (by highlighting a row from the table) and cl

Page 430

Switch Information3-18 2. Click the View button to see the contents of the selected configuration file. 3. The Main screen displays the contents of th

Page 431 - 8.3 Reviewing Core Snapshots

Switch Information3-19 To transfer the contents of a configuration file:1. Click the Transfer Files button on the bottom of the Configuration screen.

Page 432

Switch Information3-20 4. Refer to the Status field for the current state of the requests made from the applet. Requests are any “SET/GET” operation f

Page 433 - 8.4 Reviewing Panic Snapshots

Switch Information3-21 3.4 Viewing Switch Firmware InformationThe switch can store two software versions. Information about the two versions displays

Page 434 - 8.4.1 Viewing Panic Details

Table of Contents viiViewing the Ports Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-12Detailed Port Stati

Page 435 - 8.5 Debugging the Applet

Switch Information3-22 3. Refer to the Patch field for a listing of those Patches available to the switch. The name and version of each patch file is

Page 436 - 8.6 Configuring a Ping

Switch Information3-23 This firmware version will now be invoked after the next reboot of the switch.5. Refer to the Status field for the current stat

Page 437

Switch Information3-24 a. Use FTP to get the firmware update from a File Transfer Protocol (FTP) server. A user account must be established on the FTP

Page 438

Switch Information3-25 3.5 Switch File ManagementUse the File Management screen to transfer configuration file to and from the switch and review the f

Page 439 - 8.6.2 Adding a New Ping Test

Switch Information3-26 2. Refer to the Source field to specify the details of the source file.3.5.1.1 Transferring a file from Wireless Switch to Wire

Page 440 - 8.6.3 Viewing Ping Statistics

Switch Information3-27 3.5.1.2 Transferring a file from a Wireless Switch to a ServerTo transfer a file from the switch to a Server:1. Refer to the So

Page 441

Switch Information3-28 2. Provide the name of the File.3. Use the Using drop-down menu to configure whether the file transfer is conducted using FTP,

Page 442

Switch Information3-29 3.5.2 Viewing FilesUse the File System tab to review the files available to the switch. The switch maintains the following file

Page 443 - Customer Support

Switch Information3-30 4. Select CF, USB1 or USB2 and click the Format button (enabled only if the CF or USB are connected to the switch) to check if

Page 444

Switch Information3-31 2. Refer to the Switch Configuration field to enable and define the configuration for automatic configuration file updates. If

Page 445 - Adaptive AP

viii RFS7000 Series Switch System Reference GuideConfiguring Authentication Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-33Conf

Page 446 - B.1.2 Adaptive AP Management

Switch Information3-32 4. Refer to the Firmware field to enable and define the configuration for automatic firmware updates. If enabled, the located (

Page 447 - B.1.4 Licensing

Switch Information3-33 1. Select Switch > Alarm Log from the main menu tree. 2. Select either of the two available filter options to view alarm log

Page 448 - B.1.5 Switch Discovery

Switch Information3-34 4. Select an alarm and click the Details button to display an alarm description along with a system proposed solution and possi

Page 449 - Appendix B: Adaptive AP B - 5

Switch Information3-35 2. Select an alarm and click the Details button. 3. Refer to the Alarm Details and Alarm Message for the following information:

Page 450 - B.1.8 Configuration Updates

Switch Information3-36 3.8 Viewing Switch Licenses Use the Licenses screen to install and add a new licenses on the switch.To install a new license:1.

Page 451 - B.1.12 Adaptive Mesh Support

Switch Information3-37 3.9 How to use the Filter OptionUse the Filter Option to sort the display details of screen that employ the filtering option as

Page 453 - B.2.3 Independent WLANs Only

Network SetupThis chapter describes the Network Setup menu information used to configure the switch. This chapter consists of the following switch N

Page 454

Network Setup4-2 4.1 Displaying the Network InterfaceThe main Network interface displays a high-level overview of the configuration (default or otherw

Page 455

Network Setup4-3 2. Refer to the following information to discern if configuration changes are warranted: The Apply and Cancel buttons are greyed out

Page 456

Table of Contents ixViewing Access Port Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-117Viewing Adopte

Page 457 - B.4.2 Switch Configuration

Network Setup4-4 4.2 Viewing Network IP InformationUse the Internet Protocol screen to view and configure network associated IP details. The Internet

Page 458

Network Setup4-5 4. Select an IP Address from the table and click the Delete button to remove the selected entry from the list.5. Click the Add button

Page 459

Network Setup4-6 2. Select the Domain Look Up checkbox to enable the switch to query domain name servers to resolve domain names to IP addresses. 3. E

Page 460

Network Setup4-7 4. Select an entry and click the Delete button to remove the selected entry from the IP forwarding table.5. Click the Add button to c

Page 461

Network Setup4-8 2. In the Destination Subnet field, enter an IP address to route packets to a specific destination address.3. Enter a subnet mask for

Page 462

Network Setup4-9 4. Click the Clear button to remove the selected ARP entry if no longer usable.4.3 Viewing and Configuring Layer 2 Virtual LANsA virt

Page 463

Network Setup4-10 2. Select a record from the table and click the Edit button to modify the record. For more information, see Editing the Details of a

Page 464

Network Setup4-11 5. Use the Edit screen to modify the following:6. Refer to the Status field for the current state of the requests made from applet.

Page 465

Network Setup4-12 VLAN details display within the VLANs by Port tab. 3. Refer to the following information as displayed within the VLANs by Port tab:

Page 466

Network Setup4-13 3. Highlight an existing VLAN and click the Edit button. The system displays a Port VLAN Change Warning message. Be advised, changin

Comments to this Manuals

No comments