DWS-3000 User Manual R2.1
DWS-3000 User Manual R2.1
DWS-3000 User Manual R2.1
February 2008
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with this manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
CE Mark Warning
This is a Class A product. In a domestic environment, this product may cause radio interference in which case the user may be required
to take adequate measures.
Warnung!
Dies ist ein Produkt der Klasse A. Im Wohnbereich kann dieses Produkt Funkstoerungen verursachen. In diesem Fall kann vom
Benutzer verlangt werden, angemessene Massnahmen zu ergreifen.
Precaución!
Este es un producto de Clase A. En un entorno doméstico, puede causar interferencias de radio, en cuyo case, puede requerirse al
usuario para que adopte las medidas adecuadas.
Attention!
Ceci est un produit de classe A. Dans un environnement domestique, ce produit pourrait causer des interférences radio, auquel cas
l`utilisateur devrait prendre les mesures adéquates.
Attenzione!
Il presente prodotto appartiene alla classe A. Se utilizzato in ambiente domestico il prodotto può causare interferenze radio, nel cui caso
è possibile che l`utente debba assumere provvedimenti adeguati.
VCCI Warning
BSMI Warning
MIC Warning
CCC Warning
Table of Contents
Table of Contents
List of Figures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
About This Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Document Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Safety Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Safety Cautions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
General Precautions for Rack-Mountable Products . . . . . . . . . . . . . . . . . . . . 18
Protecting Against Electrostatic Discharge . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Battery Handling Reminder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1 Overview of the D-Link Unified Access System . . . . . . . . . . . 21
D-Link Unified Access System Components . . . . . . . . . . . . . . . . . . . . . . . . 21
D-Link Unified Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
D-Link Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
WLAN Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
D-Link Unified Access System Topology . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Single Unified Switch Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Peer Unified Switch Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Understanding the User Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Using the Web Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Using the Command-Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Using SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Wireless System Features and Standards Support . . . . . . . . . . . . . . . . . . . 30
2 Planning the D-Link Unified Access System Network . . . . . . 33
System Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
WLAN Topology Considerations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Access Point-to-Switch Discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Access Point Placement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Network Planning to Support Layer 3 Roaming. . . . . . . . . . . . . . . . . . . . . 37
3 Installing the Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Hardware Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Front Panel Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
LED Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Rear Panel Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Side Panels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Installation Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Installing the Switch without the Rack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3
D-Link Unified Access System User Manual
5
D-Link Unified Access System User Manual
7
D-Link Unified Access System User Manual
List of Figures
Figure 1. Sample WLAN Visualization................................................................ 23
Figure 2. Single Unified Switch with Layer 2 Roaming Support......................... 24
Figure 3. Peer Unified Switch with Layer 3 Roaming Support............................ 25
Figure 4. Web Interface Layout ............................................................................ 26
Figure 5. Cascading Navigation Menu ................................................................. 27
Figure 6. Hierarchical Tree Navigation Menu...................................................... 27
Figure 7. D-Link Unified Access System Components........................................ 34
Figure 8. Wiring Closet Topology ........................................................................ 35
Figure 9. Data Center Topology ........................................................................... 36
Figure 10. Inter-Subnet Roaming ......................................................................... 38
Figure 11. Front Panel View of the DWS-3024 as Shipped ................................. 40
Figure 12. Front Panel View of the DWS-3026 as Shipped ................................. 40
Figure 13. LED Indicators on DWS-3024 ............................................................ 40
Figure 14. LED Indicators on DWS-3026 ............................................................ 40
Figure 15. Rear panel view of DWS-3024 ........................................................... 42
Figure 16. Rear panel view of DWS-3026 ........................................................... 42
Figure 17. Prepare Switch for Installation on a Desktop or Shelf ........................ 44
Figure 18. Fasten Mounting Brackets to Switch................................................... 44
Figure 19. Mounting the Switch in a Standard 19" Rack ..................................... 45
Figure 20. Inserting the Fiber-Optic Transceivers into the Switch....................... 46
Figure 21. Front Panel of the DEM-410X ............................................................ 47
Figure 22. Front Panel of the DEM-410CX ......................................................... 47
Figure 23. Inserting the optional module into the Switch (DWS-3026)............... 47
Figure 24. DWS-3026 with optional DEM-410X module installed ..................... 48
Figure 25. RPS Connector .................................................................................... 48
Figure 26. Switch and AP Connected Directly..................................................... 49
Figure 27. Switch and APs Connected Through Network.................................... 50
Figure 28. Switch Connected to Network Core .................................................... 50
Figure 29. Ethernet Connection for Static IP Assignment.................................... 56
Figure 30. L2 Discovery Example ........................................................................ 60
Figure 31. L3 Discovery Example 1 ..................................................................... 60
Figure 32. L3 Discovery Example 2 ..................................................................... 61
Figure 33. DHCP Option Example ....................................................................... 61
Figure 34. Requiring AP Authentication .............................................................. 74
Figure 35. MAC Access Control .......................................................................... 82
Figure 36. Radio Settings...................................................................................... 83
Figure 37. VAP Settings ....................................................................................... 88
Figure 38. Configuring Network Settings............................................................. 90
Figure 39. AP Profile With Five VAPs Enabled .................................................. 93
Figure 40. Networks Available to the Wireless Client ......................................... 93
Figure 41. L3 Roaming Example.......................................................................... 95
Figure 42. AP Network Security Options ............................................................. 96
Figure 43. Static WEP Configuration ................................................................... 97
9
D-Link Unified Access System User Manual
11
D-Link Unified Access System User Manual
List of Tables
Table 1. Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Table 2. LED Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Table 3. Basic Wireless Global Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Table 4. IEEE 802.1X Supplicant Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Table 5. AP VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Table 6. L3/IP Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Table 7. Global RADIUS Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Table 8. MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Table 9. Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Table 10. Advanced Radio Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Table 11. Default VAP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Table 12. Wireless Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Table 13. Static WEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Table 14. Static WPA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Table 15. Valid Access Point Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Table 16. Valid AP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Table 17. RF Channel Plan and Power Adjustment . . . . . . . . . . . . . . . . . . . . . 108
Table 18. Channel Plan History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Table 19. AP Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Table 20. AP Upgrade Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Table 21. Advanced AP Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Table 22. AP Debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Table 23. Managed AP Channel/Power Adjust . . . . . . . . . . . . . . . . . . . . . . . . . 116
Table 24. Global WLAN Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Table 25. Peer Switch Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Table 26. Monitoring All Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Table 27. Managed Access Point Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Table 28. Detailed Managed Access Point Status . . . . . . . . . . . . . . . . . . . . . . . 128
Table 29. Managed AP Radio Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Table 30. Managed AP Radio Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Table 31. Managed AP Neighbor Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Table 32. Neighbor AP Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Table 33. Managed Access Point VAP Status . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Table 34. Managed Access Point WLAN Summary Statistics . . . . . . . . . . . . . 135
Table 35. Managed Access Point Ethernet Summary Statistics . . . . . . . . . . . . 135
Table 36. Detailed Managed Access Point Statistics . . . . . . . . . . . . . . . . . . . . . 136
Table 37. Managed Access Point Radio Statistics . . . . . . . . . . . . . . . . . . . . . . . 136
Table 38. Managed Access Point VAP Statistics . . . . . . . . . . . . . . . . . . . . . . . 137
Table 39. Access Point Authentication Failure Status . . . . . . . . . . . . . . . . . . . . 139
Table 40. Access Point RF Scan Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Table 41. Associated Client Status Summary . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Table 42. Detailed Associated Client Status . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Table 43. Associated Client Neighbor AP Status . . . . . . . . . . . . . . . . . . . . . . . 144
13
D-Link Unified Access System User Manual
Audience
The information in this guide is intended for the person responsible for installing, configuring,
monitoring, and maintaining the D-Link Unified Access System as part of a network
infrastructure.
Organization
The D-Link Unified Access System User Manual contains the following chapters:
• Chapter 1, “Overview of the D-Link Unified Access System” on page 21
• Chapter 2, “Planning the D-Link Unified Access System Network” on page 33
• Chapter 3, “Installing the Hardware” on page 39
• Chapter 4, “Installing the D-Link Unified Access System” on page 51
• Chapter 5, “Configuring Access Point Settings” on page 79
• Chapter 6, “Managing and Maintaining D-Link Access Points” on page 105
• Chapter 7, “Monitoring Status and Statistics” on page 119
• Chapter 8, “Configuring Advanced Settings” on page 151
• Chapter 9, “Configuring the Captive Portal” on page 163
• Chapter 10, “Visualizing the Wireless Network” on page 183
• Appendix A, “D-Link Unified Access System Default Settings” on page 197
• Appendix B, “Configuring the External RADIUS Server” on page 201
• Appendix C, “L3 Roaming Example” on page 209
• Appendix D, “Understanding Quality of Service” on page 223
• Appendix E, “Limited Warranty (USA Only)” on page 229
• Appendix F, “Technical Support” on page 237
Document Conventions
This section describes the conventions this document uses.
NOTE: A Note provides more information about a feature or technology.
Audience 15
D-Link Unified Access System User Manual
Safety Instructions
Use the following safety guidelines to ensure your own personal safety and to help protect
your system from potential damage.
Safety Cautions
To reduce the risk of bodily injury, electrical shock, fire, and damage to the equipment,
observe the following precautions.
• Observe and follow service markings. Do not service any product except as explained in
your system documentation. Opening or removing covers that are marked with the
triangular symbol with a lightning bolt may expose you to electrical shock. Only a trained
service technician should service components inside these compartments.
• If any of the following conditions occur, unplug the product from the electrical outlet and
replace the part or contact your trained service provider:
- The power cable, extension cable, or plug is damaged.
- An object has fallen into the product.
- The product has been exposed to water.
- The product has been dropped or damaged.
- The product does not operate correctly when you follow the operating instructions.
• Keep your system away from radiators and heat sources. Also, do not block the cooling
vents.
• Do not spill food or liquids on your system components, and never operate the product in
a wet environment. If the system gets wet, see the appropriate section in your
troubleshooting guide or contact your trained service provider.
• Do not push any objects into the openings of your system. Doing so can cause a fire or an
electric shock by shorting out interior components.
• Use the product only with approved equipment.
• Allow the product to cool before removing covers or touching internal components.
• Operate the product only from the type of external power source indicated on the electrical
ratings label. If you are not sure of the type of power source required, consult your service
provider or local power company.
• To help avoid damaging your system, be sure the voltage selection Switch (if provided) on
the power supply is set to match the power available at your location:
- 115 volts (V)/60 hertz (Hz) in most of North and South America and some Far Eastern
countries such as South Korea and Taiwan
- 100 V/50 Hz in eastern Japan and 100 V/60 Hz in western Japan
- 230 V/50 Hz in most of Europe, the Middle East, and the Far East
• Also be sure that attached devices are electrically rated to operate with the power available
in your location.
• Use only approved power cable(s). If you have not been provided with a power cable for
your system or for any AC-powered option intended for your system, purchase a power
cable that is approved for use in your country. The power cable must be rated for the
product and for the voltage and current marked on the product's electrical ratings label.
The voltage and current rating of the cable should be greater than the ratings marked on
the product.
• To help prevent an electric shock, plug the system and peripheral power cables into
properly grounded electrical outlets. These cables are equipped with three-prong plugs to
help ensure proper grounding. Do not use adapter plugs or remove the grounding prong
from a cable. If you must use an extension cable, use a 3-wire cable with properly
grounded plugs.
• Observe extension cable and power strip ratings. Make sure that the total ampere rating of
all products plugged into the extension cable or power strip does not exceed 80 percent of
the ampere ratings limit for the extension cable or power strip.
• To help protect your system from sudden, transient increases and decreases in electrical
power, use a surge suppressor, line conditioner, or uninterruptible power supply (UPS).
• Position system cables and power cables carefully; route cables so that they cannot be
stepped on or tripped over. Be sure that nothing rests on any cables.
• Do not modify power cables or plugs. Consult a licensed electrician or your power
company for site modifications. Always follow your local/national wiring rules.
• When connecting or disconnecting power to hot-pluggable power supplies, if offered with
your system, observe the following guidelines:
- Install the power supply before connecting the power cable to the power supply.
- Unplug the power cable before removing the power supply.
- If the system has multiple sources of power, disconnect power from the system by
unplugging all power cables from the power supplies.
• Move products with care; ensure that all casters and/or stabilizers are firmly connected to
the system. Avoid sudden stops and uneven surfaces.
Safety Instructions 17
D-Link Unified Access System User Manual
1. When unpacking a static-sensitive component from its shipping carton, do not remove the
component from the antistatic packing material until you are ready to install the
component in your system. Just before unwrapping the antistatic packaging, be sure to
discharge static electricity from your body.
2. When transporting a sensitive component, first place it in an antistatic container or
packaging.
3. Handle all sensitive components in a static-safe area. If possible, use antistatic floor pads
and workbench pads and an antistatic grounding strap.
Safety Instructions 19
D-Link Unified Access System User Manual
WLAN Visualization
The D-Link Unified Access System includes the WLAN Visualization tool, which provides a
graphical representation of your wireless network through a Web browser. WLAN
Visualization detects and displays the D-Link Unified Switch, D-Link Access Points, other
access points, and all wireless clients associated with the D-Link Access Point. You can import
information about your building layout to customize the network view.
Figure 1 shows an example of a floor plan and network with a D-Link Unified Switch that
manages two APs. The graph also shows a peer switch and a rogue AP in the network.
The WLAN Visualization tool provides an AP power display with color-coded channels to
help you determine where to physically place access points to reduce interference or increase
coverage on your WLAN.
Unified Switch
L2 Network
Remote Management
Station
AP 1 AP 2 AP 3
When the APs are on the same subnet and have the same SSID, wireless clients can seamlessly
roam among the three APs with no interruption in network access. The client keeps the same
IP address and does not need to re-authenticate when it moves into the broadcast area of a
different AP. Configuration changes to the APs are managed by the switch simultaneously or
on a per-AP basis.
up to 48 access points. The Unified Switch and the APs it manages do not need to be on the
same subnet.
Remote Management
Station Terminal with Direct
Serial Connection
L3 Network
Unified Switch 3
Access Points
Managed by Unified Switch 1
Access Points
Managed by Unified Switch 3
Access Points
Managed by Unified Switch 2
Peer Unified Switches share information about APs and allow Layer 3 roaming among them.
To support this, peer Unified Switches establish IPv4 tunnels so that the wireless client keeps
the same IP address even when the client associates with an access point in a different subnet.
The Layer 3 roaming service allows wireless phone users to roam between access points
connected to different subnets without dropping calls.
1. Open a Web browser and enter the IP address of the switch in the Web browser address
field.
2. Enter the user name and password into the dialogue box that appears.
The user name and password are the same as those you use to log on to the command-line
interface. By default, the user name is admin, and there is no password.
3. After the system authenticates you, the System Description page displays.
Figure 4 shows the layout of the D-Link Unified Switch Web interface. Each Web page
contains three main areas: interface configuration graphic, the navigation tree, and the
configuration status or options.
Help Page
Access
Navigation Tree
Configuration Status and Options
Click the port you want to view or configure to see a menu that displays statistics and
configuration options. Click the menu option to access the page that contains the configuration
or monitoring options. Click Logout to log out of the Web Interface. From the Logout prompt,
click Ok to save your changes and make the changes permanent. Click Cancel to close the
Web Interface without saving your changes.
If you click the graphic but do not click a specific port, the main menu appears. This menu
contains the same option as the navigation menu on the left side of the page.
Navigation Menu
A hierarchical-tree view appears to the left of the panel. The tree consists of a combination of
folders, subfolders, and configuration and status HTML pages. Click the folder to view the
options in that folder. Each folder contains either subfolders or HTML pages, or a combination
of both. Figure 6 shows an example of a folder, subfolder, and HTML page in the navigation
menu. When you click a folder or subfolder that is preceded by a plus (+), the folder expands
to display the contents. If you click an HTML page, a new page displays in the main frame. A
folder or subfolder has no corresponding HTML page.
Folder
Subfolder
HTML Page
Each page contains access to the HTML-based Help that explains the fields and configuration
options for the page. Many pages also contain command buttons.
The following command buttons are used throughout the pages in the Web interface:
Submit Clicking the Submit button sends the updated configuration to the switch.
Configuration changes take effect immediately, but some changes are not
retained across a power cycle unless you save them to the system configura-
tion file.
Save Clicking the Save button saves the current configuration to the system config-
uration file. When you click Save, changes that you have submitted are saved
even when you reboot the system. To save the configuration, use the Save
Changes link in the Tools menu.
Refresh Clicking the Refresh button refreshes the data on the panel.
WLAN Tabs
Many of the pages in the WLAN folder contain tabs to simplify navigation and to group
functions for a common feature. Click the tab to access a specific page.
NOTE: Other packages in the software suite do not use tabs in the Web interface.
Tools Menu
If you mouse over the Tool icon, a list of the following useful system tools appears:
• Reset Configuration
• Reset Password
• Reboot System
• Save Changes
• Download File
• Upload File
• Multiple Image Services
Each item in the list is a link to the Web page where you can perform the related task.
Using SNMP
For D-Link Unified Switch software that includes the SNMP module, you can configure
SNMP groups and users that can manage traps the SNMP agent generates.
The D-Link Unified Switch uses both standard public MIBs for standard functionality as well
as a number of additional private MIBs for additional functionality supported by the switch.
All private MIBs begin with a “DLINK-” prefix. The main object for interface configuration is
in DLINK-SWITCHING-MIB, which is a private MIB. Some interface configurations also
involve objects in the public MIB, IF-MIB.
SNMP is enabled by default. The System Description Web page, which is the page the
displays after a successful login, and the show sysinfo command display the information you
need to configure an SNMP manager to access the switch.
Any user can connect to the switch using the SNMPv3 protocol, but for authentication and
encryption, you need to configure a new user profile. To configure a profile by using the CLI,
see the SNMP section in the D-Link CLI Command Reference. To configure an SNMPv3
profile by using the Web interface, use the following steps:
1. Select LAN > Administration > User Accounts from the hierarchical tree on the left side
of the Web interface.
2. Using the User pull-down menu, select Create to create a new user.
3. Enter a new user name in the User Name field.
4. Enter a new user password in the Password field and then retype it in the Confirm
Password field.
To use SNMPv3 Authentication for this user, set a password of eight or more
alphanumeric characters.
5. To enable authentication, use the Authentication Protocol pull-down menu to select
either MD5 or SHA for the authentication protocol.
6. To enable encryption, use the Encryption Protocol pull-down menu to select DES for the
encryption scheme. Then, enter an encryption code of eight or more alphanumeric
characters in the Encryption Key field.
7. Click Submit.
To access configuration information for SNMPv1 or SNMPv2, click LAN > Administration
> SNMP Manager and click the page that contains the information to configure.
- 802.11 MIB
- IF MIB
- Bridge MIB
- D-Link AP Enterprise MIB
• WLAN Networking and QoS
- Switch/AP Discovery
- Tunneling
- WMM (802.11e)
- 802.1p (MAC layer QoS support)
- DSCP
- Dynamic VLANs
- MAC ACLs
- SpectralLink Priority Support
• WLAN Encryption and Security
- WEP
- TKIP
- AES & CCMP
- Rogue AP detection
- Ad-Hoc Client Detection
- Inhibit / Ignore SSID broadcast
- Weak IV avoidance
- MAC Authentication
- Port/IP blocking
- RADIUS support
- EAP
- PEAP
- TLS and TTLS
- WPA (Personal, Enterprise)
- WPA2 (Personal, Enterprise) 802.11i
- 802.1X Supplicant
- Client Authentication
- Firewall/IP filtering support
System Requirements
You accomplish the initial D-Link Unified Switch configuration by using a direct cable
connection. After the initial configuration, you can manage the Unified Switch by using a
Web-based user interface (UI), command line interface (CLI), or SNMP. The following list
describes the minimum requirements you need to install and manage the D-Link Unified
Switch:
• VT100 terminal or PC with terminal-emulation software
• Direct serial connection to the console port of the D-Link Unified Switch
• Remote system for management access with a Web browser, Telnet/SSH client, or SNMP
manager
To support security and networking features in D-Link Unified Access System, you can use
the following optional equipment on your network:
• A RADIUS server for authentication and accounting features for wireless clients, access
points, and peer Unified Switches
• Network equipment that supports VLANs
• A DHCP server to dynamically assign network information to the switch and to all access
points
• A Syslog server for external logging
System Requirements 33
D-Link Unified Access System User Manual
Figure 7 shows a simple D-Link Unified Access System deployment with required and
optional equipment for setup and operation.
Unified Switch
AP 1
Terminal with Direct
Serial Connection
Network AP 2
Remote Management
Station
AP 3
NOTE: The D-Link Unified Switch has a built-in DHCP server. If you do not already
have a DHCP server on your network, you can configure the Unified Switch
to assign network information to network hosts.
As the figure shows, the wireless clients can be laptop computers, personal digital assistants
(PDAs), smart phones, or any other hand-held, portable or stationary device equipped with a
Wi-Fi adapter and supporting drivers. In order to connect to the access point, wireless clients
need the software and hardware the following list describes:
• A portable or built-in Wi-Fi client adapter that supports one or more of the IEEE 802.11
modes in which you plan to run the access point. (IEEE 802.11a, 802.11b, 802.11g)
• Client software such as Microsoft Windows Supplicant configured to associate with the
WLAN.
• Wireless security software that is compatible with the authentication mode the access
point uses.
equipment such as hubs, routers, or other switches directly to the 10/100/1000 Mbps Ethernet
ports on the switch. All connections to the D-Link Unified Switch must be wired connections
since the switch does not have any radios.
In Figure 8, the D-Link Unified Switches are both LAN and WLAN switches that handle
traffic from end users connected to the wired LAN as well as traffic from the D-Link Access
Points. In the diagram, Building 1 and Building 2 have a D-Link Unified Switch on each floor.
Unified Switch
Unified Switch
Building 1
Floor 2 Unified Switch Unified Switch Building 2
Floor 2
Unified Switch
Unified Switch
Building 1
Floor 1 Building 2
Floor 1
To Network
Backbone
APs
APs APs APs
The four D-Link Unified Switches are in the same peer group. This allows wireless clients to
roam between floors and between buildings without the need to re-authenticate. Additionally,
each Unified Switch shares its list of managed APs and wireless clients with the switches in
the peer group so that the APs and wireless clients are not reported as rogues (unknown).
The topology in Figure 8 works well if you need to add, upgrade, or replace LAN switches on
your network.
NOTE: When tunneled clients are used in conjunction with peer switches, one of the
peer switches must be configured as a default gateway for the tunneled cli-
ents. Normally the default gateway routes all traffic from the client’s subnet to
other subnets, however in a peer switch network the Unified Switch that man-
ages the AP to which the client is associated routes the frames into the remote
subnets. This means that each peer switch must have routing table entries that
enable it to route frames to every subnet in the network.
Figure 9 shows two D-Link Unified Switches in the network data center. In this deployment,
the switches do not connect directly to APs or end-user nodes.
LAN Switch
Unified Switches
APs
Network
Backbone
Data Center
LAN Switch
APs
The data center topology is a good solution in networks where the goal is to add a wireless
LAN to a network with minimal changes to the existing network. Traffic from wireless clients
to the APs is either tunneled through the Unified Switch or tagged with a VLAN ID by the AP
and handled accordingly. If the traffic is tagged, it might not pass through the Unified Switch.
of the D-Link Access Point is about 100 meters, but the range is affected by various
environmental factors.
To maximize the range, use the following guidelines for the placement of the AP:
• Place the AP in an area where you expect wireless clients will operate.
• Elevated locations, such as on top of a shelf are preferred to increase line-of-sight access.
• Avoid placing the AP near sources of interference, such as PCs, microwaves, and 2.4 GHz
cordless phones.
• Keep the AP away from large metal surfaces.
• Position the antenna horizontally to increase the up-and-down range, or position it
vertically to increase side-to-side coverage.
• When APs are within broadcast range of each other, use non-interfering RF channels (five
channels apart for the 802.11b/g radio).
How close you place APs to each other depends on the RF transmission power level, the
number of wireless clients on your network, and the channels the APs use. The RF signal
transmission power level directly affects the broadcast range of the AP signal. If the power
level is too low, wireless clients will not detect the signal or experience poor WLAN
performance. If the power level is too high, the RF signal might interfere with other APs
within range. If the RF signal broadcasts beyond the physical confines of your building or
network, it increases the security threat to the network.
When the power level is high and RF broadcast area is larger, more wireless clients can detect
the signal and associate with the AP. An increase in the number of wireless clients that
associate with the AP generally means that the amount of traffic the AP receives and transmits
increases as well. You can limit the network utilization level allowed on an AP to prevent
wireless clients from experiencing slower network speeds. However, once the network
utilization is reached, new clients are unable to associate with the AP. If an AP frequently
reaches the network utilization limit, it might indicate that you should add another AP nearby.
You can configure the APs to automatically adjust the power and channel to the needs of the
network environment.
any of the APs, it receives an IP address from the Unified Switch that is in the L3 Tunnel
subnet. As the client roams among the APs, it maintains its connection to the WLAN and
keeps the same IP address that the switch originally assigned it. All traffic the client sends and
receives goes through the switch.
Client
IP: 10.20.20.12
AP 1 Unified Switch
IP: 192.168.24.173
AP 3
IP: 192.168.85.49
Client
IP: 10.20.20.12
In the tunneling configuration, you can use ACL lists and QoS parameters to ensure that time-
sensitive traffic, such as VoIP, takes priority over other WLAN traffic.
For many IP phone systems, you must connect a call server to a wired port on the L3 tunnel
subnet. You must also either configure DHCP relay on the switch or configure the switch to be
a DHCP server. APs, peer switches, and other routers cannot be connected to the L3 tunnel
subnet.
For more information about L3 tunnelling and how to configure it, see “Configuring a VAP for
L3 Tunnels” on page 94 and Appendix C, “L3 Roaming Example”on page 209.
Hardware Overview
This section describes the font, back, and side panels and the LED indicators on the switch.
The DWS-3024 and DWS-3026 have slightly different front and back panels based on the
available features.
Hardware Overview 39
D-Link Unified Access System User Manual
LED Indicators
The Switch supports LED indicators for Power, Console, RPS, PoE, and Port LEDs including
10GE port LEDs for optional module inserts on the DWS-3026.
The following table describes the LEDs and the Mode Select Button on the front panel of each
Switch.
Table 2. LED Description
LED Description
Power This LED lights green after powering the Switch on to indicate the ready
state of the device. The indicator is dark when the Switch is no longer
receiving power (i.e powered off).
Console This LED blinks green during the Power-On Self Test (POST). When the
POST is finished, the LED goes dark. The indicator lights steady green when
an active console link is in session via the RS-232 console port.
RPS This LED lights when the internal power has failed and the RPS has taken
over the power supply to the Switch. Otherwise, it remains dark.
Link/Act/Speed You can change the mode of the LEDs over each port to display the
and PoE Mode information about the link, activity, and speed of a port or whether 802.3af
Power Over Ethernet (PoE) is supporting devices attached to the port.
To change the LED mode from Link/Act/Speed to PoE and vice versa, press
the LED Mode Select Button.
Port LEDs One row of LEDs for each port is located above the ports on the front panel.
The indicator above the left side of a port corresponds to the port below the
indicator in the upper row of ports. The indicator above the right side of a
port corresponds to the port below the indicator in the lower row of ports.
The port LEDs show information about link, activity, and speed on the port
or Power over Ethernet usage on the port, depending on the LED mode you
select.
For Link/Act/Speed Mode:
• Solid Green—Indicates a valid 1000Mbps link on the port, while a
blinking green light indicates activity on the port (at 1000Mbps).
• Solid Amber—Indicates a valid 10 or 100Mbps link on the port.
• Blinking Amber—Indicates activity on the port (at 100Mbps).
• Off—No link/activity on the port.
For PoE Mode:
• Solid Green—Power feeding (802.3af-compliant PD was detected).
• Blinking Amber—PoE port ERROR (non-standard PD connected, Under
load state according to 802.3af (current is below I min), Overload state
according to 802.3af (current is above I cut), hardware problems
preventing port operation, power budget exceeded, short condition was
detected at a port delivering power, temperature overload at the port,
succession of Underload and Overload states caused port shutdown (may
be caused by a PD's DC/DC fault)...etc.)
• Off—No power feeding (no PD detected, or no connection)
Hardware Overview 41
D-Link Unified Access System User Manual
LED Description
10GE Port LEDs (DWS-3026 only) A steady green light denotes a valid link on the port while
a blinking green light indicates activity on the port. These LEDs remain dark
if there is no link/activity on the port.
Combo SFP Ports The LED indicators for the Combo ports are located above the ports and
numbered 1 – 4 for Combo 1, Combo 2, Combo 3, and Combo 4 ports. A
steady green light indicates a valid link on the port while a blinking green
light indicates activity on the port. These LEDs remain dark if there is no
link/activity on the port.
The rear panel of the DWS-3026 contains an AC power connector, a system fan vent, a
redundant power supply connector and two empty slots for optional 10GE module inserts.
Side Panels
The system fans and heat vents located on each side of the Switch dissipate heat. Do not block
these openings. Leave at least 6 inches of space at the rear and sides of the Switch for proper
ventilation. Without proper heat dissipation and air circulation, system components might
overheat, which could lead to system failure and severely damage components.
Installation
This section describes how to install the Switch on a flat surface or in a standard equipment
rack. It also describes how to install the optional components for the Switch.
Package Contents
Open the shipping carton of the Switch and carefully unpack its contents. The carton should
contain the following items:
1. One Switch
2. One AC power cord
3. Mounting kit (two brackets and screws)
4. Four rubber feet with adhesive backing
5. RS-232 console cable
6. One CD Kit for DWS-3000 Series Administrator’s Guide and CLI Reference Guide
7. Registration card & China Warranty Card (for China only)
If any item is missing or damaged, please contact your local D-Link Reseller for replacement.
Installation Guidelines
Please follow these guidelines for setting up the Switch:
• Install the Switch on a sturdy, level surface that can support at least 6.6 lb. (3 kg) of
weight. Do not place heavy objects on the Switch.
• The power outlet should be within 1.82 meters (6 feet) of the Switch.
• Visually inspect the power cord and see that it is fully secured to the AC power port.
• Make sure that there is proper heat dissipation from the Switch and adequate ventilation
around the Switch. Leave at least 10 cm (4 inches) of space at the front and rear of the
Switch for ventilation.
• Install the Switch in a fairly cool and dry place for the acceptable temperature and
humidity operating ranges.
• Install the Switch in a site free from strong electromagnetic field generators (such as
motors), vibration, dust, and direct exposure to sunlight.
• When installing the Switch on a level surface, attach the rubber feet to the bottom of the
device. The rubber feet cushion the Switch, protect the casing from scratches, and prevent
it from scratching other surfaces.
Installation 43
D-Link Unified Access System User Manual
Rubber Feet
Fasten the mounting brackets to the Switch using the screws provided. With the brackets
attached securely, the Switch can be mounted in a standard rack as shown in Figure 19.
Power Failure
As a precaution, in the event of a power failure, unplug the Switch. When power is resumed,
plug the Switch back in.
Installation 45
D-Link Unified Access System User Manual
315GT (1000BASE-ZX) transceivers. See the figure below for installing the SFP ports in the
Switch.
Figure 23. Inserting the optional module into the Switch (DWS-3026)
Installation 47
D-Link Unified Access System User Manual
Now tighten the two screws at adjacent ends of the module into the available screw holes on
the Switch. The upgraded Switch is now ready for use.
DWS-3026
UTP Cable
Access Point
L2/L3 Network
Core Network
enabled in order for the switch to discover and validate D-Link Access Points. If the
routing mode is disabled, the Unified Switch function uses the IP address of the network
interface. If routing is enabled, the switch uses a loopback or routing interface for the
wireless functions. Changing the IP address of the network interface automatically
disables and re-enables the wireless function. Enabling routing also disables and re-
enables the wireless function.
4. Configure the default AP Profile settings that the access point will use after the switch
validates it.
When the switch successfully validates an access point, it sends the AP Profile to the
access point. The AP Profile contains all of the access point configuration information,
such as the radio, security, and SSID settings. You can configure all of the AP settings
before or after the switch validates an AP. For information about configuring the default
AP profile, see Chapter 5, “Configuring Access Point Settings” on page 79.
5. Prepare and deploy D-Link Access Points and enable AP-to-switch discovery.
After you connect an AP to the network and it obtains an IP address (either statically or
dynamically by using DHCP), the Unified Switch can automatically discover the AP.
However, if your network uses IEEE 802.1X authentication or you require the AP to be
authenticated by the switch upon discovery, you must log on to the AP and configure
security information.
6. Authenticate and validate the APs.
You can optionally configure the Unified Switch so that it only manages APs that it
authenticates. You can use the local database or an external RADIUS database for AP
authentication. Whether or not you require AP-to-Unified Switch authentication, the
switch must be able to validate an AP before it can manage the AP. For the switch to
validate the AP, you must add the MAC address of each AP to the AP database on the
switch or to the database on an external RADIUS server.
Once you validate the AP, you can use the switch to manage the AP and to view client
associations, status, and statistics.If you follow the procedures in this chapter, the APs will
have the default configuration profile. The default AP Profile settings are listed in
Appendix A.
CAUTION: The default AP profile does not use a security mechanism for wireless
client associations. All wireless clients will be able to connect to an AP
and access your network.
To prevent unauthorized access to the network by wireless clients, you can configure security
on the default profile before you deploy the APs, or you can create additional AP profiles to
assign the APs when you add them to the Valid AP database. For information about how to
configure default profile settings, see Chapter 5, “Configuring Access Point Settings” on
page 79.
You can use the switch to create multiple AP profiles to assign the APs that you deploy on
your network. For each profile, you can define information such as RF configuration, QoS
configuration, and virtual AP (VAP) configuration. For information about AP profiles, see
“AP Profiles, Networks, and the Local Database” on page 79. For information about creating
and configuring a new AP profile, see “Creating, Configuring, and Managing AP Profiles” on
page 151.
The default gateway is an optional parameter, so you do not need to enter an address
to execute the command.
Once the D-Link Unified Switch is connected to the network, you can use the IP address for
remote access to the switch by using a Web browser or through Telnet or SSH.
Field Description
Enable WLAN Check the box to enable WLAN switching functionality on the system. Clear
Switch the check box to administratively disable the WLAN switch.
If you clear the check box, all peer switches and APs that are associated with
this switch are disassociated.
Disabling the WLAN switch does not affect non-WLAN features on the
switch, such as VLAN or STP functionality.
WLAN Switch Shows the operational status of the switch. The status can be one of the
Operational Status following values:
• Enabled
• Enable-Pending
• Disabled
• Disable-Pending
If the status is pending, click Refresh to refresh the screen.
Field Description
WLAN Switch If the status is disabled, this field appears and one of the following reasons is
Disable Reason listed:
• None—The cause for the disabled status is unknown.
• Administrator disabled—The Enable WLAN Switch check box has been
cleared.
• No IP Address—The WLAN interface does not have an IP address.
• No SSL Files—The D-Link Unified Switch communicates with the APs
it manages by using Secure Sockets Layer (SSL) connections. The first
time you power on the Unified Switch, it automatically generates a
server certificate that will be used to set up the SSL connections. The
SSL certificate and key generation can take up to an hour to complete.
If routing is enabled on the switch, the operational status might be disabled
due to one of the following reasons:
• No Loopback Interface—The switch does not have a loopback interface.
• Global Routing Disabled—Even if the routing mode is enabled on the
WLAN switch interface, it must also be enabled globally for the
operational status to be enabled.
For information about how to configure a loopback interface and enable
routing, see “D-Link Unified Switch with Routing Enabled” on page 63.
IP Address This field shows the IP address of the WLAN interface on the switch. If
routing is disabled, the IP address is the network interface. If routing is
enabled, this is the IP address of the routing or loopback interface you
configure for the Unified Switch features.
AP Authentication Select the check box to require APs to be authenticated before they can
associate with the switch.
AP MAC Select the database to use for AP validation.
Validation • Local—If you select this option, you must add the MAC address of each
AP to the local Valid AP database.
• RADIUS—If you select this option, you must configure the MAC
address of each AP in an external RADIUS server.
Country Code Select the country code for the country where your switch and APs operate.
A popup window asks you to confirm the change.
Wireless regulations vary from country to country. Make sure you select the
correct country code so that your WLAN system complies with the
regulations in your country. Some WLAN modes, such as the Atheros
modes, are not available in some countries.
Changing the country code disables and re-enables the switch. Any channel
and radio mode settings that are invalid for the regulatory domain are reset to
the default values.
The country code (IEEE 802.11d) is transmitted in beacons and probe
responses from the access points.
From the CLI, you can view the same information that is available on the Wireless Global
Configuration page with the show wireless command in Privileged EXEC mode. If you
need to change the country code, you can view the list of available countries and their two-
letter codes with the show wireless country-code command.
The CLI commands to set the country code and enable the WLAN switch are available in
Wireless Config mode. To set the country code, enter country-code <code>. To enable the
WLAN switch, enter enable. The following example shows how to access Wireless Config
mode, set the country code to Canada, and enable the WLAN switch.
(switch-prompt) #configure
(switch-prompt) (Config)#wireless
(switch-prompt) (Config-wireless)#country-code CA
(switch-prompt) (Config-wireless)#enable
Logging on to the AP
You can access the AP CLI only through Telnet. The default IP address is 10.90.90.91/8, and
DHCP is enabled by default on the D-Link Access Point. When you connect the AP to a
network with a DHCP server, the AP automatically acquires an IP address. If there is no
DHCP server on the network, the AP retains its default IP address of 10.90.90.91/8 until you
assign a static IP address.
For initial configuration with a direct Ethernet connection, make sure your PC has an IP
address in the 10.0.0.0/8 subnet so you can access the AP CLI.
To use a direct-cable connection, connect one end of an Ethernet straight-through or crossover
cable to the network port on the access point and the other end of the cable to the Ethernet port
on the PC, as shown in Figure 29.
Crossover or straight-through
cable if your AP
If you use this method, you will need to reconfigure the cabling for subsequent startup and
deployment of the access point so that the access point is no longer connected directly to the
PC but instead is connected to the LAN.
When you Telnet to the AP CLI the DLINK-WLAN-AP login: prompt appears.
Enter admin as the user name and admin as the password. After a successful login, the
DLINK-WLAN-AP# prompt appears.
For information about how to disable the DHCP client on the AP or to set a static IP address,
see “D-Link Access Point” on page 65 in the Assigning the IP Address to Switches and
Managed APs section.
Action Command
View 802.1X supplicant settings get dot1x-supplicant
Enable 802.1X supplicant set dot1x-supplicant status up
Disable 802.1X supplicant set dot1x-supplicant status down
Set the 802.1X user name set dot1x-supplicant user <name>
Set the 802.1s password set dot1x-supplicant password <password>
In the following example, the administrator enables the 802.1X supplicant and sets the user
name to wlanAP and the password to test1234.
WLAN-AP# set dot1x-supplicant status up
WLAN-AP# set dot1x-supplicant user wlanAP
WLAN-AP# set dot1x-supplicant password test1234
WLAN-AP# get dot1x-supplicant
Property Value
----------------
status up
user wlanAP
To configure the pass phrase on the AP, use the following command:
set managed-ap pass-phrase <phrase>
The pass phrase can be up to 32 alphanumeric characters.
For example, the following command sets the AP-to-Unified Switch authentication pass
phrase to test1234.
WLAN-AP# set managed-ap pass-phrase test1234
For more information about AP-to-Unified Switch authentication and how to configure it on
the switch, see “Configuring AP Authentication” on page 73.
Action Command
View management interface get management
information, including the VLAN ID
Set the management VLAN ID set management vlan-id <1-4094>
View untagged VLAN information get untagged-vlan
Enable the untagged VLAN set untagged-vlan status up
Disable the untagged VLAN set untagged-vlan status down
Set the untagged VLAN ID set untagged-vlan vlan-id <1-4094>
In order for the Unified Switch to discover other WLAN devices and establish communication
with them, the devices must have their own IP address, must be able to find other WLAN
devices, and must be compatible.
When the D-Link Unified Switch discovers and validates D-Link Access Points, the switch
takes over the management of the AP. The default AP Profile settings are listed in
Appendix A.
For information about how to change the AP Profile settings, see Chapter 5, “Configuring
Access Point Settings” on page 79.
Example 1: L2 Discovery
In Figure 30, the AP and Unified Switch are directly connected. The devices are in the same
layer 2 broadcast domain and use the default VLAN settings. After both devices acquire an IP
address, either statically or through DHCP, the Unified Switch automatically discovers the AP
through its broadcast of a L2 discovery message.
L2 Discovery
Message
In this example, the administrator does not need to configure any discovery information on the
AP or the Unified Switch. The L2 discovery works automatically when the devices are directly
connected or connected by using a layer 2 bridge.
For more information about this discovery method, see “D-Link Wireless Device Discovery
Protocol” on page 66.
Access Point 1
ge er
s a ov
IP: 192.168.1.12
es sc
M Di
P
D
U
Access Point 2
IP: 192.168.3.42
The administrator disables the L2 discovery method on the switch and adds the IP addresses of
the APs to the L3 Discovery list on the switch. The Unified Switch sends UDP discovery
messages to the IP addresses in its list. When the AP receives the messages and decides that it
can connect to the switch, it initiates an SSL TCP connection to the switch.
For information about how to configure this discovery method, see “Configuring IP Addresses
of Peers and APs in the Switch” on page 67.
UDP Discovery
Unified Switch IP List Message
U
D e
P ss s L
(5
D a
M
Se
is ge ter
co
co
ve
nd
ry
a
)
Unified Switch 2
IP: 192.168.22.161
The AP sends a UDP discovery message to the first IP address configured in its list. When the
switch receives the message, it verifies that the vendor ID on the AP is valid, there is no
existing SSL TCP connection to the access point, and the maximum number of managed APs
hasn't been reached. If all these conditions are met then the switch sends an invitation message
to the AP to start the SSL TCP connection.
If the AP does not receive an invitation from the first Unified Switch configured in its list, it
sends a UDP discovery message to the second Unified Switch configured in the list five
seconds after sending the message to the first Unified Switch.
When an IP address of a Unified Switch is configured on the AP, the AP only associates with
that switch even if other switches discover the AP by using other mechanisms.
For more information about how to configure this discovery method, see “Setting the Switch
IP Address in the D-Link Access Point” on page 69.
DHCP Request
DHCP Response
AP DHCP Server
The AP can learn up to four Unified Switch IP addresses or DNS names through DHCP option
43 in the DHCP response.
This discovery method only works if you configure the DHCP option before the AP receives
its network information from the DHCP server.
For information about how to configure option 43 with the IP address of one or more Unified
Switch, see “Setting the Switch Information in the DHCP Option” on page 71.
2. Enable routing.
(switch-prompt) (Config)#ip routing
3. Change to Interface Config mode for loopback interface 0, and assign an IP address and
subnet mask.
(switch-prompt) (Config)#interface loopback 0
(switch-prompt) (Interface loopback 0)#ip address 10.1.1.1 255.255.0.0
4. [Optional] Change to Interface Config mode for slot 0, port 2, assign an IP address, and
enable routing on the interface.
(switch-prompt) (Config)#interface 0/2
(switch-prompt) (Interface 0/2)#ip address 192.168.1.24 255.255.255.0
(switch-prompt) (Interface 0/2)#routing
You can also use the Web interface or SNMP to enable routing and configure an IP address.
The following shows the procedures to enable routing and configure an IP address on the
switch by using the Web interface.
NOTE: Routing is available under the LAN tab on the navigation menu.
1. Log on to the Web interface and click L3 Features > IP > Configuration to access the IP
Configuration page.
2. From the Routing Mode drop-down menu, choose Enable, and then click Submit.
3. To create a loopback interface, click Routing > Loopback > Configuration.
4. From the Loopback drop-down menu, choose Create, and then click Submit
5. Enter an IPv4 address and subnet mask in the appropriate fields, and then click Submit.
6. To create a routing interface and assign an IP address, click Routing > IP > Interface
Configuration, and select the interface to configure from the Slot/Port drop-down menu.
7. Enter an IP address and subnet mask in the appropriate fields, choose Enable from the
Routing Mode drop-down menu, and click Submit.
its association unless the connectivity to the current Unified Switch fails or the switch tells
the AP to disassociate and associate with another switch.
The following sections describe each discovery mechanism.
From the Unified Switch, you can check the discovery status. To view information about
whether the switch discovered the AP, click the Monitoring > Access Points > Managed
Access Points tab. If you have not added the MAC address of the AP to the local or RADIUS
Valid AP database, the AP appears in the Monitoring > Access Point > Authentication
Failed Access Points list, and the failure type is listed as No Database Entry. For more
information about AP validation, see “Authenticating and Validating Access Points” on
page 72.
The following example shows how to add a VLAN to the list by using the CLI.
1. From a Telnet, SSH, or serial connection, log on to the D-Link Unified Switch and enter
the Wireless Configuration mode.
(switch-prompt) >enable
Password:
(switch-prompt) #config
(switch-prompt) (Config)#wireless
Configuration Saved!
To check the managed status from the Unified Switch CLI, enter the following command:
(switch-prompt) #show wireless ap status
Field Description
L3/IP Discovery This check box is used to enable or disable IP-based discovery of access
points and peer Unified Switches. When checked, IP polling is enabled and
the switch will periodically poll each address in the configured IP List. By
default, L3/IP Discovery is enabled.
IP List The list of IP addresses configured for discovery, to remove entries from the
list select one or more entries and press the delete button. There are no
default entries, the maximum number of entries supported is 256.
IP Address Range This text field is used to add a range of IP address entries to the IP List. Enter
the IP address at the start of the address range in the From field, and enter
the IP address at the end of the range in the To field, then click Add. All IP
addresses in the range are added to the IP List. Once all desired entries are
added, click Submit to save the list in the running configuration.
NOTE: To add a single IP address, enter the address in the From field and
leave the To field blank, then click Add.
To view the IP address of the AP, log on to the AP as described in “Logging on to the AP” on
page 56 and enter the get management command.
Use the following procedures to add the IP address of a peer switch or AP to the discovery list
by using the Web interface:
To view information about whether the switch successfully polled the IP address you entered,
click the Monitoring > Global > IP Discovery tab.
The following example shows how to add an address to the L3 Discovery list by using the
CLI.
1. From a Telnet, SSH, or serial connection, log on to the D-Link Unified Switch and enter
the Wireless Configuration mode.
(switch-prompt) >enable
Password:
(switch-prompt) #config
(switch-prompt) (Config)#wireless
Configuration Saved!
To check the managed AP status from the Unified Switch CLI, enter the following command:
(switch-prompt) #show wireless ap status
for AP association, but you can only use one switch to manage the AP. The other three
switches are backup or alternate switches.
Once you configure the AP with the IP addresses or DNS names of switches, the AP will only
associate with those switches. Even if other switches discover the AP by using other
mechanisms, the AP only accepts associations from the Unified Switches you configure. If
you change the IP address of the switch that manages the AP, you must use a secondary switch
to manage the AP. You can connect directly to the AP CLI and configure the IP address of the
switch that will manage the AP.
If you know the IP address of the D-Link Access Point, you can Telnet to the CLI. The default
IP address of the AP is 10.90.90.91 with a default subnet mask of 255.0.0.0.
NOTE: For this method to work, the AP must be able to find a route to the Unified
Switch.
3. Use the get managed-ap command to verify that the information you entered is correct.
WLAN-AP# get managed-ap
Property Value
-------------------------------------
mode up
ap-state down
switch-address-1 192.168.66.202
switch-address-2 192.168.19.242
switch-address-3
switch-address-4
dhcp-switch-address-1
dhcp-switch-address-2
dhcp-switch-address-3
dhcp-switch-address-4
managed-mode-watchdog 5
From the Unified Switch, you can check the discovery status. To view information about
whether the switch discovered the AP, click the Monitoring > Access Points > Managed
Access Points tab. It might take several minutes for the AP to discover the switch.
NOTE: If you have not added the MAC address of the AP to the local or RADIUS
Valid AP database, the AP appears in the Monitoring > Access Point >
Authentication Failed Access Points list, and the failure type is No Database
Entry. For more information about AP validation, see “Authenticating and
Validating Access Points” on page 72.
To check the Managed AP status from the Unified Switch CLI, enter the following command:
(switch-prompt) #show wireless ap status
1. From the DHCP manager, right-click the applicable scope and select Configure
Options...
2. From the Available Options list, scroll to Option 43 and select the 043 Vendor Specific
Info check box.
3. Enter the Option 43 data into the Data Entry field.
The format for DHCP option 43 values are defined by RFC 2132. To enter an IP address
of 192.168.1.10 into the Binary column, you enter the data type code (01) and the address
length (04), followed by the IP address in hexadecimal format. You repeat the data type
and address length codes for each address you enter.
For example, to add the four switch IP addresses 192.168.1.10, 192.168.2.10,
192.168.3.10, and 192.168.4.16 to Option 43, you enter the following hexadecimal
numbers into the Data Entry field:
01 04 0C A8 01 0A 01 04 0C A8 02 0A 01 04 0C A8 03 0A 01 04 0C A8 04 10
The following image shows the four IP addresses entered into the Data Entry field on the
Windows DHCP server.
4. Click OK.
The following figure shows a scope with Option 43 configured.
by another Unified Switch, it looks up the MAC address of the AP in the local or RADIUS
Valid AP database. If it finds the MAC address in the database, the switch validates the AP and
assumes management. If you have not added the MAC address of the AP to the database, the
AP appears in the Authentication Failed Access Points list, and the failure type is No Database
Entry.
Optionally, you can require that the AP is authenticated before the Unified Switch manages it.
You can add authentication information about the AP when you add its MAC address to the
local or RADIUS database.If you enable authentication, it takes place immediately after the
switch validates the AP.
NOTE: When a switch successfully validates an AP, it sends an AP Profile to the
access point. The AP Profile contains all of the access point configuration
information, such as the radio, security, and SSID settings. You can configure
all of the AP settings before the switch validates an AP. For information about
configuring the default AP profile, see Chapter 5, “Configuring Access Point
Settings” on page 79.
Configuring AP Authentication
Unless access to the wired network is secured with IEEE 802.1X authentication or another
security mechanism, the AP should always use authentication so that Rogue APs do not
automatically associate with the switch.
If you require the AP to authenticate itself to the switch, you must perform the following three
steps:
To enable AP authentication on the Unified Switch, click Administration > Basic Setup.
From the Global tab, check the AP Authentication box, then click Submit to apply your
changes.
To enable AP authentication from the CLI, access Wireless Config mode and enable
authentication:
(switch-prompt) >enable
Password:
(switch-prompt) #config
(switch-prompt) (Config)#wireless
(switch-prompt) (Config-wireless)#ap authentication
1. From the Administration > Basic Setup > Global page, make sure AP Validation is set to
Local, which is the default.
2. Click Submit if you made any changes.
3. Click the Valid AP tab.
4. In the MAC Address field, enter the MAC address of the AP to validate, and enter the
physical location of the AP in the second field, then click Add.
NOTE: If the switch has already discovered the AP, the MAC address of the AP
appears on the Monitoring > Access Points > Managed Access Points page
or on the Monitoring > Access Point > Authentication Failed Access
Points page. To view the MAC address of discovered APs from the CLI, enter
show wireless ap status or show wireless ap failure status in
Privileged EXEC mode.
After you add the AP, additional fields appear so you can provide configuration
information about the AP, including a passphrase for AP authentication.
5. If you selected the AP Authentication check box on the Wireless Global Configuration
page, select the Apply check box and enter an authentication password for the AP.
The password must match the pass phrase that you configured on the AP. The length of the
password can be 8-63 alphanumeric characters, but for good security, you should enter at
least 24 characters.
6. Use the default settings or configure other information about the AP, such as the channel
the AP uses and the strength of the power transmission.
For more information about the fields on the Valid Access Point Configuration page and
how to configure valid APs, see “Configuring Valid Access Point Settings” on page 101.
7. Click Submit to apply your changes to the running configuration.
The following example shows how to configure the local database by using the CLI:
3. Enter the MAC address of the AP to add to the database and configure a password:
(switch-prompt) (Config-wireless)#ap database 00:02:BC:00:14:40
4. If you require AP-to-switch authentication, enter the pass phrase for the AP
(switch-prompt) (Config-ap)#password
Enter password (8 - 63 characters):******************
Re-enter password:******************
For information about configuring additional database parameters for an AP by using the CLI,
see the D-Link CLI Command Reference.
1. From the Administration > Basic Setup > Global page, set AP Validation to RADIUS.
2. Click Submit to apply the changes.
3. From the LAN menu, click Security > RADIUS > Authentic Radius Configuration.
The RADIUS settings in the AAA/RADIUS tab in the Wireless Global Configuration
Basic Setup are applied to access points that use the default AP Profile - and not to the
switch. If you require a RADIUS server to authenticate wireless clients before they can
associate with an AP, you configure the settings in the AAA/RADIUS tab as described in
“Configuring AAA and RADIUS Settings” on page 81.
4. Enter the IP address of the RADIUS server to use for the valid AP database and click
Submit.
1. Access either the Authentication Failed Access Points page or the Rogue/RF Scan
Access page from the by clicking Monitoring > Access Point folder.
2. Select the check box associated with the AP and click Manage.
The AP is added to the Valid AP database, and its MAC address appears in the list on the
Administration > Basic Setup > Valid AP page. If the switch requires AP Authentication
for all APs, click the MAC address of the AP to configure the pass phrase.
NOTE: You cannot add an AP to the RADIUS database from the AP authentication
failure page. If you use a RADIUS server for AP Validation, you must enter
the AP information into the RADIUS database.
To view the list of failed APs by using the CLI, use the show wireless ap failure status
command in Privileged EXEC mode. To view the list of APs detected through the RF scan,
use the show wireless ap rfscan status command.
To add a failed or rogue AP to the local Valid AP database, use the procedures described in
“Using the Local Database for AP Validation” on page 74.
configurations may be copied to another profile or used to create a new profile. Each
configuration profile can have unique settings for the following access point features:
• RADIUS server settings
• MAC authentication list
• Radio interface and RF configuration
• QOS Configuration
• Virtual Access Point (VAP) Configuration
When you modify and apply a profile, the switch applies the changes to the APs it manages
that use the modified profile.
NOTE: The switch only applies the changes to the APs after you explicitly apply the
profile on the Advanced Configuration > AP Profile page or use the ap
profile apply command.
Until you apply the updated profile to the APs, the APs continue to operate with the original
AP profile settings. If you assign a new profile to the AP in the Valid AP database, you must
reset the AP.
All of the AP settings that you configure from the tabs on the Basic Setup page are for the
default AP profile. When you make changes to these settings, the settings affect all APs that
use the default profile.
All of the fields that you configure for the default profile are also available for profiles that
you create. For information about how to create a new profile and assign it to an AP, see
“Creating, Configuring, and Managing AP Profiles” on page 151.
Networks
In general, a wireless client connects to an access point by choosing a network (identified by
the SSID) from a list of available wireless networks. You configure these wireless networks,
including their associated SSID, on the D-Link Unified Switch.
You manage the networks available on the WLAN by modifying or adding network
configurations, which include settings for the SSID, VLAN ID, security, and tunneling
parameters. You can associate a network with a Virtual APs (VAPs) within an AP
configuration profile.
By default, the switch has 8 networks, and each network is associated with one of the 8 VAPs
on each radio. You can modify (but not delete) the default network configurations and add new
network configurations. The first network is configured with a default SSID “Guest Network,”
and the other networks have default SSIDs assigned based on the Network ID. All the default
networks are configured with open authentication and assigned to the default VLAN 1. The
default VLAN is used if RADIUS-based authentication is not configured for the network or
the RADIUS server does not return a VLAN for a specific client.
AP’s MAC address according to the validation mode (local or RADIUS) as long as the AP is
enabled for Managed Mode and has been authentication (if required). Once the AP is verified,
it becomes managed by the switch.
If an AP is discovered and its MAC address is not found in the Valid AP database or the AP
fails to authenticate, the switch adds an entry to the AP failure list. If you use the local Valid
AP database, you can add the failed AP to the Valid AP database directly from the AP
Authentication Failures page.
The Valid AP database stores additional information about the AP along with its MAC address
such as the AP mode, local authentication password, and the AP profile that the access point
uses. You can also manually set the channel and RF signal transmit power level for an
individual AP, which overrides the channel and power settings in the AP profile.
Field Description
IP Address This is the IP address of the RADIUS server the AP uses for authentication.
Secret The RADIUS Secret is the shared secret key for the RADIUS server. Click the Edit
check box to enter a secret. The text you enter is displayed as “*” characters to
prevent others from seeing the RADIUS key as you type.
Accounting RADIUS Accounting allows you to track and measure the resources a particular user
has consumed such as system time and amount of data transmitted and received.
To add a wireless client to the MAC Authentication list, enter the MAC address of the client in
the MAC Address field and click Add. You must click Submit to apply the changes.
The following table describes the MAC Authentication fields in more detail.
Field Description
Default Action The default action is the action that is taken for unknown MAC addresses of
wireless clients that attempt to associate with an access point.
• Allow—Only the clients you explicitly add to this list are allowed access
to APs that use MAC Authentication.
• Deny—Only the clients you explicitly add to this list are denied access
to APs that use MAC Authentication.
MAC List This list shows the MAC address of the wireless clients that have already
been added to the list of wireless clients to allow or deny access to the APs.
MAC Address Enter the MAC address of the wireless client to allow or deny access to all
APs that use this profile.
The following table describes the fields you can configure from the Radio tab on the Basic
Setup page. After you change the settings, click Submit to apply the settings.
Table 9. Radio Settings
Field Description
State Specify whether you want the radio on or off by clicking On or Off.
If you turn off a radio, the AP sends disassociation frames to all the wireless
clients it is currently supporting so that the radio can be gracefully shutdown
and the clients can start the association process with other available APs.
Super A Super A and Super G attempt to increases performance through bursting and
Super G frame compression. Performance increases when the AP communicates with
Super A and Super G-enabled clients. However, with Super A and Super G
enabled, the access point transmissions consume more bandwidth.
• To enable Super A or Super G, select Enabled.
• To disable Super A or Super G, select Disabled.
• To enable Super A or Super G with Dynamic Turbo, select Enable with
Dynamic Turbo.
RTS Threshold The RTS threshold specifies the packet size of a request to send (RTS)
transmission. This helps control traffic flow through the access point,
especially one with a lot of clients.
If you specify a low threshold value, RTS packets will be sent more
frequently. This will consume more bandwidth and reduce the throughput of
the packet.
On the other hand, sending more RTS packets can help the network recover
from interference or collisions which might occur on a busy network, or on a
network experiencing electromagnetic interference.
The RTS Threshold value can be between 0 and 2347.
Load Balancing If you enable load balancing, you can control the amount of traffic that is
allowed on the AP.
Load Utilization This field allows you to set a threshold for the percentage of network
bandwidth utilization allowed on the radio. Once the level you specify is
reached, the AP stops accepting new client associations.
If you specify 0 in this field, all new associations will be allowed regardless
of the utilization rate.
RF Scan Other The access point can perform RF scans to collect information about other
Channels wireless devices within range and then report this information to the Unified
Switch.
If you select the Scan Other Channels check box, the radio periodically
moves away from the operational channel to scan other channels.
Enabling this mode causes the radio to interrupt user traffic, which may be
noticeable with voice connections. Changing the channels also causes the
radio to lose auto-calibration settings which may degrade the signal quality.
When the Scan Other Channels check box is not enabled the AP scans only
the operating channel.
RF Scan Interval This field controls the length of time between channel changes during the RF
Scan.
Field Description
RF Scan Sentry If you select the RF Scan Sentry check box, the radio primarily performs
dedicated RF scanning. The radio passively listens for beacons and traffic
exchange between clients and other access points but does not accept
connections from wireless clients. In sentry mode, all VAPs are disabled.
In this mode, the radio switches from one channel to the next. The length of
time spent on each channel is controlled by the scan duration. The default
scan duration is 10 milliseconds.
RF Scan Sentry The radio can scan channels in the radio frequency used by the 802.11b/g
Channels band, the 802.11a band, or both bands. Select the channel band for the radio
to scan.
NOTE: The band selection applies only to radios in sentry mode.
Station Isolation Select the check box to enable station isolation, or clear it to disable station
isolation.
• Enabled: Access point blocks communication between wireless clients.
The access point still allows data traffic between its wireless clients and
wired devices on the network, but not among wireless clients.
• Disabled: wireless clients can communicate with one another normally
by sending traffic through the access point.
Rate Sets Check the transmission rate sets you want the access point to support and the
basic rate sets you want the access point to advertise.
Rates are expressed in megabits per second.
Basic These numbers indicate rates that the access point will advertise to the
network for the purposes of setting up communication with other APs and
client stations on the network. It is generally more efficient to have an AP
broadcast a subset of its supported rate sets.
Supported These numbers indicate rates that the access point supports. You can check
multiple rates (click a check box to select or de-select a rate). The AP
automatically chooses the most efficient rate based on factors like error rates
and distance of client stations from the AP.
Mode The Mode defines the Physical Layer (PHY) standard the radio uses.
The DWL-3500AP and Radio 1 on the DWL-8500AP use the IEEE 802.11g
mode PHY standard. This mode is a higher speed extension (up to 54 Mbps)
to the 802.11b PHY, while operating in the 2.4 GHz band. It uses orthogonal
frequency division multiplexing (OFDM). It supports data rates ranging from
1 to 54 Mbps. IEEE 802.11b clients can use the 802.11g mode.
Radio 2 on the DWL-8500AP use the IEEE 802.11a mode, which is a PHY
standard that specifies operating in the 5 GHz U-NII band using orthogonal
frequency division multiplexing (OFDM). It supports data rates ranging from
6 to 54 Mbps.
If the radio state is disabled, the mode displays as Off.
Maximum Clients Specify the maximum number of stations allowed to access this access point
at any one time.
You can enter a value between 0 and 256.
Field Description
DTIM Period The Delivery Traffic Information Map (DTIM) message is an element
included in some beacon frames. It indicates which client stations, currently
sleeping in low-power mode, have data buffered on the access point awaiting
pick-up.
The DTIM period you specify indicates how often the clients served by this
access point should check for buffered data still on the AP awaiting pickup.
Specify a DTIM period within the given range (1 - 255).
The measurement is in beacons. For example, if you set this field to “1”
clients will check for buffered data on the AP at every beacon. If you set this
field to 10, clients will check on every 10th beacon.
Beacon Period Beacon frames are transmitted by an access point at regular intervals to
announce the existence of the wireless network. The default behavior is to
send a beacon frame once every 100 milliseconds (or 10 per second).
The Beacon Interval value is set in milliseconds. Enter a value from 20 to
2000.
Automatic The channel defines the portion of the radio spectrum that the radio uses for
Channel transmitting and receiving. The range of channels and the default channel are
determined by the Mode of the radio interface.
When the AP boots, the AP scans the RF area for occupied channels and
selects a channel from the available non-interfering, or clear channels.
However, channel conditions can change during operation.
Enabling the Automatic Channel makes APs assigned to this profile eligible
for auto-channel selection. You can automatically or manually run the auto-
channel selection algorithm to allow the Unified Switch to adjust the channel
on APs as WLAN conditions change.
By default, the global auto-channel mode is set to manual. To enable the
automatic channel selection mode, go to the AP Management > RF
Management page and select Fixed or Interval for the Channel Plan mode.
You can also run the automatic channel selection algorithm manually from
the Manual Channel Plan page.
NOTE: If you assign a static channel to an AP in the Valid AP database or on
the Advanced AP Management page, the AP will not participate in the auto-
channel selection.
Limit Channels If the radio is operating in 802.11a mode, you can select the Limit Channels
check box to allow the AP to select from the available channels.
NOTE: The available channels depends on the country in which the APs
operate.
If the Limit Channels option is not selected, the AP can also broadcast on
channels 149, 153, 157, 161, and 165. Some legacy 802.11a adapters might
not support these higher channel numbers.
Field Description
Automatic Power The power level affects how far an AP broadcasts its RF signal. If the power
level is too low, wireless clients will not detect the signal or experience poor
WLAN performance. If the power level is too high, the RF signal might
interfere with other APs within range.
Automatic power uses a proprietary algorithm to automatically adjust the RF
signal to broadcast far enough to reach wireless clients, but not so far that it
interferes with RF signals broadcast by other APs. The power level algorithm
increases or decreases the power level in 10% increments based on presence
or absence of packet retransmission errors.
Initial Power The automatic power algorithm will not reduce the power below the number
you set in the initial power field. By default, the power level is 100%.
Therefore, even if you enable the automatic power, the power of the RF
signal will not decrease.
The power level is a percentage of the maximum transmission power for the
RF signal.
Antenna Diversity Select the antenna use to receive and transmit wireless traffic:
• Auto: Automatically select the best antenna to send and receive traffic.
• Primary: Use the primary antenna to send and receive traffic.
• Secondary: Use the secondary antenna to send and receive traffic.
If you access the Access Point Profile Radio configuration through the Advanced
Configuration > AP Profile > Radio tab, some additional fields are available for
configuration.
The following table describes the fields for the AP radio that are only available from the
Advanced Configuration menu.
Table 10. Advanced Radio Configuration
Field Description
RF Scan Duration This field controls the amount of time the radio spends scanning the other
channel (in milliseconds) during an RF scan.
Transmit Lifetime Shows the number of milliseconds to wait before terminating attempts to
transmit the MSDU after the initial transmission.
Receive Lifetime Shows the number of milliseconds to wait before terminating attempts to
reassemble the MMPDU or MSDU after the initial reception of a fragmented
MMPDU or MSDU.
Frag Threshold The fragmentation threshold limits the size of packets transmitted over the
network. Acceptable values are even numbers from 256-2345. Packets that
are under the configured size are not fragmented. A value of 2346 means that
packets are not fragmented.
Short Retries The value in this field indicates the maximum number of transmission
attempts on frame sizes less than or equal to the RTS Threshold. The range is
1-255.
Long Retries The value in this field indicates the maximum number of transmission
attempts on frame sizes greater than the RTS Threshold. The range is 1-255.
VAPs segment the wireless LAN into multiple broadcast domains that are the wireless
equivalent of Ethernet VLANs. To a wireless client, each VAP appears to be a single physical
access point. However, since the VAPs use the same channel, there is no risk of RF
interference among the networks that are on a single AP.
VAPs can help you maintain better control over broadcast and multicast traffic, which affects
network performance. You can also configure different security mechanisms for each VAP.
A VAP is a “physical” entity. Each VAP maps directly to a MAC address. A network is a
logical entity that you apply to a VAP. Networks are identified by a network number and an
associated SSID. The SSID does not need to be unique for each network. You can create and
modify a network in one place and apply the network to one or more VAP as needed. This
allows you to mix networks within different profiles without having to reconfigure everything.
When you edit a network configuration that is applied to more than one VAP, you edit it for
every VAP that uses the network.
Field Description
Radio 1 You configure the VAPs for Radio 1 and Radio 2 separately. Select the radio
Radio 2 to configure the settings for before you enable the VAP.
Check Box This check box enables or disables the corresponding VAP on the radio.
When checked, the VAP is enabled. The SSID field on the page is also
enabled to allow network selection for the VAP.
NOTE: You cannot disable the default VAP, VAP0.
Network The drop-down menu lists the available networks that you can assign to the
VAP. You can configure up to 64 separate networks on the switch and apply
them across multiple radio and VAP interfaces. By default, eight networks
are pre-configured and applied in order to the VAPs on each radio.
To configure additional networks, click Advanced Configuration >
Networks.
Edit Click Edit to modify settings for the corresponding network.
When you click edit, the Wireless Network Configuration page appears.
VLAN Shows the VLAN ID of the VAP. To change this setting, click Edit.
L3 Tunnel Shows whether L3 Tunneling is enabled on the VAP. To change this setting,
click Edit.
NOTE: When L3 tunneling is enabled the VLAN ID is not used. In fact, the
switch puts the management VLAN ID, if any, on the tunneled packets.
Hide SSID Shows whether the VAP broadcasts the SSID. If enabled, the SSID for this
network is not included in AP beacons. To change this setting, click Edit.
Security Shows the current security settings for the VAP. To change this setting, click
Edit.
When you click Edit on the VAP page, the Wireless Network Configuration page appears, as
Figure 38 shows.
Table 12 describes the fields on the Wireless Network Configuration page. After you change
the wireless network settings, click Submit to save the changes.
Table 12. Wireless Network Configuration
Field Description
SSID Wireless clients identify a wireless network by the SSID, which is an
alphanumeric key that uniquely identifies a wireless local area network. The
SSID can be up to thirty-two characters in length, and there are no
restrictions on the characters that may be used in an SSID.
Hide SSID You can hide the SSID broadcast to discourage stations from automatically
discovering your access point. When the broadcast SSID of the AP is hidden,
the network name is not displayed in the list of available networks on a client
station. Instead, the client must have the exact network name configured in
the supplicant before it is able to connect.
Disabling the broadcast SSID is sufficient to prevent clients from
accidentally connecting to your network, but it will not prevent even the
simplest of attempts by a hacker to connect, or monitor unencrypted traffic.
This offers a very minimal level of protection on an otherwise exposed
network (such as a guest network) where the priority is making it easy for
clients to get a connection and where no sensitive information is available.
Field Description
VLAN A virtual LAN (VLAN) is a software-based, logical grouping of devices on a
network that allow them to act as if they are connected to a single physical
network, even though they may not be. The nodes in a VLAN share
resources and bandwidth, and are isolated on that network.
The D-Link Unified Access System supports the configuration of a wireless
VLAN. You can configure each VAP to be on a unique VLAN or on the same
VLAN as other VAPs.
When a wireless client connects to the AP by using this network (SSID), the
AP tags the client’s traffic with the VLAN ID you configure in this field. By
default, all networks use VLAN 1, which is also untagged by default.
NOTE: The VLAN ID you configure in this field can be overwritten by the
VLAN ID configured for the AP in the RADIUS server. In other words, if
your network uses a RADIUS server to assign wireless clients to VLANs, the
wireless client uses the VLAN ID from the RADIUS server and ignores the
VLAN ID configured on the VAP.
L3 Tunnel The L3 Tunnel feature allows mobile stations to maintain their IP
connections while roaming from one access point to another access point
even when these access points are attached to different IP subnets.
NOTE: When L3 tunneling is enabled the VLAN ID is not used. In fact, the
switch puts the management VLAN ID, if any, on the tunneled packets.
NOTE: If the wireless network topology changes (for example, a
DWS-3000 switch reboots) while the L3 tunneling feature is in use, you
should perform an ARP refresh on wired clients to speed up the process of
re-establishing connectivity to the tunneled network.
Before you enable this feature, make sure your network meets the design
requirements described in “Network Planning to Support Layer 3 Roaming”
on page 37.
For more information about the L3 Roaming network, see “Configuring a
VAP for L3 Tunnels” on page 94.
L3 Tunnel Status This field shows the status of L3 Tunneling. In order for tunnel to be
completely configured, routing must be enabled and the switch must have a
routing interface IP address that is in the tunnel subnet. The the status can be
one of the following:
• None (L3 Tunnel is disabled or the network is not associated with any
AP profiles)
• Configured
• Not Configured - Routing Disabled
• Not Configured - No Routing Interface
L3 Tunnel Subnet The network IP address you enter in this field must be in the same subnet as a
routing interface for the WLAN that you define on the switch.
L3 Tunnel Mask Enter the subnet mask for the network IP address on the L3 Tunnel subnet.
Field Description
MAC If you enable MAC authentication, wireless clients must be authenticated by
Authentication the AP in order to connect to the network. You must configure the MAC
addresses of the clients to accept or deny (based on the default action you set
in the AP profile) in one of the following databases:
• Local
• RADIUS
RADIUS IP If you use a RADIUS server to authenticate wireless clients, you can use the
Address same RADIUS server that you configure on the AAA/RADIUS tab for the
profile, or you can specify a different RADIUS server.
To specify a RADIUS server for this VAP, clear the Use Profile check box
and enter the IP address of the RADIUS server in the field.
RADIUS Secret To enter a RADIUS secret, select the Edit check box and type the secret in
the field.
RADIUS Select the RADIUS Accounting check box to enable accounting for wireless
Accounting clients on the specified RADIUS server.
Security The default AP profile does not use any security mechanism by default. In
order to protect your network, we strongly recommend that you select a
security mechanism so that unauthorized wireless clients cannot gain access
to your network.
The following WLAN network security options are available:
• None
• WEP
• WPA/WPA2
If you select WEP or WPA/WPA2 as your security mechanism, a dialogue
box asks if you want to change network security. After you click OK,
additional fields appear, and any network settings that you modified are
applied to the switch.
“Configuring AP Security” on page 96 describes the security mechanisms
and the additional fields you can configure if you select WEP or
WPA/WPA2.
Figure 40 shows what a user on a Microsoft Windows XP client sees when the user searches
for wireless networks within range.
Although the wireless client finds five different wireless networks, these networks are all on
the same access point. The D-Link Access Point looks like five separate access points to the
wireless client.
In this example, the administrator configured multiple VAPs based on different functional
groups within the company. Each VAP has a different SSID, security settings, and VLAN ID
to separate traffic.
You can associate the same network (SSID) with multiple VAPs. When you do this, the VAPs
look like the same network to wireless clients. Some administrators configure VAPs with
identical settings on each radio so that wireless clients can connect to the same network
whether their wireless adapters are 802.11a or 802.11b/g compatible.
By default, both radios have the same networks assigned to the VAPs, and only VAP0 is
enabled. You must configure each radio independently. In other words, if you enable
additional VAPs on one radio, it does not affect the VAPs on the second radio.
In general, only clients that transmit and receive time-sensitive data while roaming need to
take advantage of this feature. Figure 41 shows a network with two APs that are controlled by
a D-Link Unified Switch. The APs and switch are all on different subnets.
Associated With:
AP1
SSID: VoIP Network
IP: 192.168.100.51
AP1
3 VAPs
SSID - Guest Network Unified Switch
SSID - Company WLAN
SSID - VoIP Network
Associated With:
AP1
SSID: Company WLAN
IP: 192.168.20.20
AP2
3 VAPs:
SSID - Guest Network
SSID - Company WLAN
SSID - VoIP Network
Associated With:
AP2
SSID: Guest Network
IP: 192.168.30.11
Associated With:
AP2
SSID: VoIP Network
IP: 192.168.100.52
Both of the APs in Figure 41 use the same default profile. The default profile has three virtual
access points (VAPs) enabled, and each VAP uses a different network (SSID). When users
search for available wireless networks, all three SSIDs appear in the list of networks. The
laptop clients connect to the Company WLAN or Guest Network, and the VoIP phones
connect to the VoIP Network.
The L3 Tunnel feature is enabled on the VoIP network, but it is disabled on the Guest and
Company WLAN networks since those networks are primarily for data traffic. The VoIP
network is for voice traffic. L3 Roaming uses IP tunneling so clients appear to be on the same
subnet even though the APs are on different subnets.
In the sample network that Figure 41 shows, the laptop users are connected to different WLAN
networks on two different APs. The Internet phone users are connected to the same WLAN
network on two different APs. On the VoIP Network, the phone users can seemlessly roam
between AP1 and AP2 without service interruption or the need to re-authenticate or change
networks.
The Unified Switch uses a VLAN routing interface as a separate logical network configured
for the L3 tunnel network. This network is the L3 tunneling subnet and has a network address
of 192.168.100.0.
Tunneling is not expected to work with port-based routing interfaces. All tunneled routing
interfaces must be VLAN routing interfaces. APs should not be attached via port-based
routing interfaces as well.
If the wireless network topology changes (for example, a DWS-3000 switch reboots) while the
L3 tunneling feature is in use, you should perform an ARP refresh on wired clients to speed up
the process of re-establishing connectivity to the tunneled network.
For information about how to configure a network to use L3 tunneling, including CLI
commands and Web configuration procedures, see Appendix C, “L3 Roaming Example” on
page 209.
Configuring AP Security
The Default AP profile does not use any security mechanism by default. In order to protect
your network, we strongly recommend that you select a security mechanism so that
unauthorized wireless clients cannot gain access to your network.
From the Wireless Network Configuration page, you can select None, WEP or WPA/WPA2
as the WLAN security mechanisms, as Figure 42 shows. The default is None.
Using No Security
If you select None as your security mode, no further options are configurable on the AP. This
mode means that any data transferred between the D-Link Access Point and the associated
wireless clients is not encrypted, and any wireless client can associate with the AP.
This security mode can be useful during initial network configuration or for problem solving,
but it is not recommended for regular use on the internal network because it is not secure.
WEP encrypts data moving across the wireless network based on a static key. (The encryption
algorithm is a “stream” cipher called RC4.)
If you select WEP as the Security Mode, additional fields display, as Figure 43 shows.
Field Description
Static WEP or Static WEP uses static key management. You manually configure the same
WEP IEEE 802.1X keys to encrypt data on both the wireless client and the AP. Dynamic WEP
(WEP IEEE 802.1X) uses dynamically generated keys to encrypt client-to-
AP traffic. Dynamic WEP is more secure than Static WEP, but you need a
RADIUS server to manage the keys.
If you select WEP IEEE 802.1X, the screen refreshes, and there are no more
fields to configure. The AP uses the global RADIUS server IP address and
secret or the RADIUS server settings you specify for the VAP. The AP acts as
the RADIUS client and must be configured as a client in the RADIUS server.
For information about how to configure the global RADIUS server settings
on the Unified Switch, see “Configuring AAA and RADIUS Settings” on
page 81.
Authentication Choose the authentication type:
• Open System—No authentication is performed
• Shared Key—Provides a rudimentary form of user authentication,
which many experts consider to be less secure than Open System since it
sends the WEP key to the client in plain text.
• Both—Only WEP clients are authenticated.
WEP Key Type Select the key type by clicking one of the radio buttons:
• ASCII—includes upper and lower case alphabetic letters, the numeric
digits, and special symbols such as @ and #
• Hex—includes digits 0 to 9 and the letters A to F
Field Description
WEP Key Length Specify the length of the key by clicking one of the radio buttons:
• 64 bits
• 128 bits
• 152 bits
Tx The Transfer Key Index indicates which WEP key the access point uses to
encrypt the data it transmits. To select a transfer key, click the button located
between the key number and the field where you enter the key. In Figure 43,
the transfer key is 3.
WEP Keys You can specify up to four WEP keys. In each text box, enter a string of
characters for each key. These are the RC4 WEP keys shared with the
stations using the access point.
Use the same number of characters for each key. The number of keys you
enter depends on the Key Type and Key Length. The following list shows the
number of keys to enter in the field:
• 64 bit—ASCII: 5 characters; Hex: 10 characters
• 128 bit—ASCII: 13 characters; Hex: 26 characters
• 152 bit—ASCII: 16 characters; Hex: 32 characters
Each client station must be configured to use one of these same WEP keys in
the same slot as specified here on the AP.
If you select WPA/WPA2 as the security mode, additional fields display, as Figure 44 shows.
Table 14 describes the configuration options for the Static WPA security mode.
Field Description
WPA Personal or WPA/WPA2 Personal uses static key management. You manually configure
WPA Enterprise the same keys to encrypt data on both the wireless client and the AP.
WPA/WPA2 Enterprise uses a RADIUS server and dynamically generated
keys to encrypt client-to-AP traffic. WPA Enterprise is more secure than
WPA Personal, but you need a RADIUS server to manage the keys.
If you select WPA Enterprise, the screen refreshes and a different set of
fields appear (described later in this table). The AP uses the global RADIUS
server IP address and secret or the RADIUS server settings you specify for
the VAP. The AP acts as the RADIUS client and must be configured as a
client in the RADIUS server.
For information about how to configure the global RADIUS server settings
on the Unified Switch, see “Configuring AAA and RADIUS Settings” on
page 81.
WPA Versions Select the types of client stations you want to support:
• WPA. If all client stations on the network support the original WPA but
none support the newer WPA2, then select WPA.
• WPA2. If all client stations on the network support WPA2, we suggest
using WPA2 which provides the best security per the IEEE 802.11i
standard.
• WPA and WPA2. If you have a mix of clients, some of which support
WPA2 and others which support only the original WPA, select both of
the boxes. This lets both WPA and WPA2 client stations associate and
authenticate, but uses the more robust WPA2 for clients who support it.
This WPA configuration allows more interoperability, at the expense of
some security.
Field Description
WPA Ciphers Select the cipher suite you want to use:
• TKIP
• CCMP (AES)
• TKIP and CCMP (AES)
Both TKIP and AES clients can associate with the access point. WPA
clients must have one of the following to be able to associate with the AP:
• A valid TKIP key
• A valid AES-CCMP key
WPA Key Type Select the key type by clicking one of the radio buttons:
• ASCII—includes upper and lower case alphabetic letters, the numeric
digits, and special symbols such as @ and #
• Hex—includes digits 0 to 9 and the letters A to F
Passphrase The WPA Key is the shared secret key for WPA Personal. Enter a string of
at least 8 characters to a maximum of 63 characters.
Pre-Authentication If you select WPA/WAP2 Enterprise, you can enable Pre-Authentication.
Click the Pre-Authentication check box if you want WPA2 wireless clients
to send pre-authentication packets. The pre-authentication information is
relayed from the access point the client is currently using to the target
access point.
Enabling this feature can help speed up authentication for roaming clients
who connect to multiple access points. Only clients that connect by using
WPA2 can use this feature. It is not supported by the original WPA.
Pre-Authentication Enter the number of pre-authentications that can be in progress
Limit simultaneously on an AP. The limit prevents too much load on the RADIUS
server. This does not prevent the pre-authentication from being attempted
again when the load is lighter. A value of 0 represents no limit.
NOTE: This field is only available if you access the network through the
AP Profile or Network page under Advanced Configuration.
Key Forwarding Select the check box to allow APs to forward the Pairwise Master Key
(PMK) for the wireless client to other APs in case the client roams to
another AP.
NOTE: This field is only available if you access the network through the
AP Profile or Network page under Advanced Configuration.
Key Caching Hold Enter the amount of minutes a PMK will be held by the AP. This applies to
Time PMKs generated by RADIUS, those that come from pre-authentication, and
those that are forwarded to the AP. Note that this time limit can be
overridden by RADIUS if the RADIUS server returns a longer time in the
Session-Timeout attribute for a particular user. The valid values of this are
from 1-1440 minutes.
NOTE: This field is only available if you access the network through the
AP Profile or Network page under Advanced Configuration.
After you enter the MAC address of the AP to add to the list, click Add to add the AP to the
database and to access the configuration page for the AP. For an AP that is already in the
database, click the MAC address of the AP to access its configuration page.
Table 15. Valid Access Point Summary
Field Description
MAC Address Enter the MAC address of the AP in this field. When you add the MAC
address, you add the AP to the local database on the switch.
Managed Mode This field displays the current mode of the AP. You can configure the mode
on the Valid Access Point Configuration page, which you access by clicking
the MAC address of the AP.
Profile This field displays the AP profile assigned to the AP.
If you have multiple AP profiles, you can assign a new profile to an AP from
the summary page. Select the check box next to one or more APs, then select
the new profile from the drop-down menu. Click Change Profile to apply
the profile to the selected APs.
If you use the local database for AP validation, the switch maintains the database of access
points that you validate. When you add the MAC address of an AP to the database, you can
specify whether the AP is a Managed AP, Standalone AP, or Acknowledged Rogue and assign
an AP profile to the device. When the switch collects and reports information from the RF
scan, it can assign the appropriate status to an AP if it is in the database.
Table 16 describes the fields available on the Valid Access Point Configuration page.
Table 16. Valid AP Configuration
Field Description
MAC Address This field shows the MAC address of the AP. To change this field, you must
delete the entire Valid AP configuration and then enter the correct MAC
address from the page that lists all Valid APs.
Managed Mode You can configure the D-Link Access Point to be in one of three modes:
• Standalone—The AP acts as an individual access point in the network.
You do not manage the AP by using the switch. Instead, you log on to
the AP itself and manage it by using the Administrator Web User
Interface (UI) or CLI.
• WS Managed—The AP is part of the D-Link Unified Access System,
and you manage it by using the D-Link Unified Switch. If an AP is in
Managed Mode, the Administrator Web UI on the AP are disabled.
• Acknowledged Rogue—The AP has been discovered by the switch and
acknowledge as a Rogue. This AP is not a D-Link Access Point. You can
add an Acknowledged Rogue to the Valid AP list to prevent the Rogue
from being identified as a threat.
Location To help you identify the AP, you can enter a location. This field accepts up to
32 alphanumeric characters.
Authentication You can require the AP to authenticate itself with the switch upon discovery.
Password If you require authentication, which is a setting on the Basic Setup > Global
tab, you enter the password in this field. The password in this field must
match the password configured on the AP.
Profile If you configure multiple AP Profiles, you can select the profile to assign to
this AP. For more information about configuring AP Profiles, see “Creating,
Configuring, and Managing AP Profiles” on page 151.
Field Description
Channel The Channel defines the portion of the radio spectrum that the radio uses for
transmitting and receiving. The range of channels and the default channel are
determined by the Mode of the radio interface and the country in which the
APs operate.
In the United States, IEEE 802.11b/802.11g modes (802.11 b/g) support use
of channels 1 through 11 inclusive, while IEEE 802.11a mode supports a
larger set of non-consecutive channels (36,40,44, 48, 52, 56, 60, 64, 149,
153, 157, 161, 165).
Interference can occur when multiple access points within range of each
other are broadcasting on the same or overlapping channels. The impact of
this interference on network performance can intensify during busy times
when a large amount of data and media traffic is competing for bandwidth.
If you select auto, the AP scans the RF area for occupied channels and selects
a channel from the available non-interfering, or clear channels. The AP
selects the best channel whenever its radio or radios restart.
If you specify a channel, make sure that the channel does not interfere with
the channel that neighbor APs use.
NOTE: The channel you set for an AP in the valid AP database is fixed and
takes precedence over initial channel selection done by the AP and any
automatic channel planning done by the switch.
NOTE: For radios that use 802.11a mode, some countries have a regulatory
domain that requires radar detection. For these countries (based on the
country code setting), the radio automatically uses the 802.11h protocol for
selecting the channel if radar is detected on the statically assigned channel.
Power The power level affects how far an AP broadcasts its RF signal. If the power
level is too low, wireless clients will not detect the signal or experience poor
WLAN performance. If the power level is too high, the RF signal might
interfere with other APs within range.
The default value of 0 indicates that the AP uses the power level set in the AP
profile.
NOTE: The power level you set for an AP in the valid AP database is fixed
and takes precedence over any automatic power adjustments done by the AP
or the switch.
Select the APs you want to reset and click Reset, or click Reset All to reset all of the APs
managed by the switch.
The APs might take several minutes to reset and re-establish communication with the switch.
While the AP is resetting, the status changes to failed, and then back to managed once the AP
is back online.
Additionally, radios configured to use Super A or Super G cannot use the channel plan
algorithm.
NOTE: If the AP is not assigned a fixed channel or is not assigned a specific channel
by the automatic channel selection algorithm, the AP channel selection mode
is set to “best.” This means that the AP selects the “best” channel whenever
the radio restarts or if the AP detects a radar signal.
The RF transmission power level affects how far an AP broadcasts its signal. If the power
level is too low, wireless clients will not detect the signal or experience poor WLAN
performance. If the power level is too high, the RF signal might interfere with other APs
within range or broadcast the signal beyond the desired physical boundaries, which can create
a security risk.
Automatic power uses a proprietary algorithm to automatically adjust the RF signal to
broadcast far enough to reach wireless clients, but not so far that it interferes with RF signals
broadcast by other APs.
To configure Channel Plan and Power Adjustment settings, click AP Management > RF
Management.
Table 17 describes the RF Channel Plan and Power Adjustment fields you can configure.
NOTE: When the AP changes its channel, all associated wireless clients temporarily
lose their connection to the AP and must re-associate. The re-association can
take several seconds, which can affect time-sensitive traffic such as voice and
video.
Field Description
Channel Plan Before you configure channel plan settings, select the mode to configure.
Channel Plan This field indicates the channel assignment mode. The mode of channel plan
Mode assignment can be one of the following:
• Fixed Time—If you select the fixed time channel plan mode, you
specify the time for the channel plan and channel assignment. In this
mode the plan is applied once every 24 hours at the specified time.
• Manual—With the manual channel plan mode, you control and initiate
the calculation and assignment of the channel plan. You must manually
run the channel plan algorithm and apply the channel plan to the APs.
• Interval—In the interval channel plan mode, the switch periodically
calculates and applies the channel plan. You can configure the interval
to be from every 6 to every 24 hours. The interval period begins when
you click Submit.
Channel Plan The channel plan history lists the channels the switch assigns each of the APs
History Depth it manages after a channel plan is applied. Entries are added to the history
regardless of interval, time, or channel plan mode.
The number you specify in this field controls the number of iterations of the
channel assignment.
NOTE: The APs changed in previous iterations cannot be assigned new
channels in the next iteration. This history prevents the same APs from being
changed time after time. For example, if the history depth is set to 3, and an
access point changes its channel for iteration 1, then it will not change the
channel before iteration 5 of the channel adjustment algorithm (if needed).
Channel Plan If you select the Interval channel plan mode, you can specify the frequency
Interval at which the channel plan calculation and assignment occurs. The interval
time is in hours, and you can specify an interval that ranges between every 6
hours to every 24 hours.
Channel Plan If you select the Fixed Time channel plan mode, you can specify the time at
Fixed Time which the channel plan calculation and assignment occurs. The channel plan
calculation will occur once every 24 hours at the time you specify.
Field Description
Power Adjustment You can set the power of the AP radio frequency transmission in the AP
Mode profile, the local database or in the RADIUS server. The power level in the
AP profile is the default level for the AP, and the power will not be adjusted
below the value in the AP profile.
The settings in the local database and RADIUS server always override power
set in the profile setting. If you manually set the power, the level is fixed and
the AP will not use the automatic power adjustment algorithm.
You can configure the power as a percentage of maximum power, where the
maximum power is the minimum of power level allowed for the channel by
the regulatory domain or the hardware capability.
• Manual—In this mode, you run the proposed power adjustments
manually from the Manual Power Adjustments page.
• Interval—In this mode, the switch periodically calculates the power
adjustments and applies the power for all APs. The interval period
begins when you click Submit.
NOTE: If you set the power level in the local or RADIUS database, the
settings override the power level set in the AP profile.
For more information about manually setting the power level, see
“Configuring Wireless Radio Settings” on page 83 and “Configuring Valid
Access Point Settings” on page 101.
Power Adjustment This field determines how often the switch runs the power adjustment
Interval algorithm. The algorithm runs automatically only if you set the power
adjustment mode to Interval.
Field Description
802.11a The 802.11a and 802.11g radios use different channel plans, so the switch
802.11g tracks the channel history separately for each radio. The channel information
that displays on the page is only for the radio you select.
Operational Status This field shows whether the switch is using the automatic channel
adjustment algorithm on the D-Link Access Point radios.
Last Iteration The number in this field indicates the last iteration of channel plan
adjustments. The APs that received a channel adjustment in previous
iterations cannot be assigned new channels in the next iteration to prevent the
same APs from being changed time after time.
On the AP Management > RF Management > Configuration tab, you can
set the history depth to control the maximum number of iterations stored and
displayed in the channel plan history.
Last Algorithm Shows the date and time when the channel plan algorithm last ran.
Time NOTE: To set the system time on the switch, you must use SNTP, which is
disabled by default. From the Web interface, you configure the SNTP client
and server information from the LAN > Administration > SNTP Settings
page. From the CLI, use the sntp commands in Global Config mode.
AP MAC Address This table displays the channel assigned to an AP in an iteration of the
Location channel plan.
Radio
Iteration
Channel
The Current Status of the plan shows one of the following states:
• None—The channel plan algorithm has not been manually run since the last switch reboot.
• Algorithm In Progress—The channel plan algorithm is running.
• Algorithm Complete—The channel plan algorithm has finished running. A table displays
to indicate proposed channel assignments. Each entry shows the AP along with the current
and new channel. To accept the proposed channel change, click Apply. You must
manually apply the channel plan for the proposed assignments to be applied.
• Apply In Progress—The switch is applying the proposed channel plan and adjusting the
channel on the APs listed in the table.
• Apply Complete—The algorithm and channel adjustment are complete.
After the channel plan runs, a table shows any APs that the algorithm recommends for new
channel assignments. The current channel shows the current operating channel, and the new
channel shows the proposed channel. To apply the new channels, click Apply. If no APs
appear after the algorithm is complete, the algorithm does not recommend any channel
changes.
It is possible for the network configuration to change between the time the automatic channel
selection runs and the time you attempt to apply the proposed channel assignments.
The channel will fail to be applied to an AP if one of the following conditions exist:
• The AP has failed.
• The radio on the AP has been disabled through a profile update.
• The channel is not valid for the radio mode.
• The AP has been rebooted since the channel plan was computed and acquires a static
channel that has been set statically via local database.
• The channel has been set manually through the advanced page.
• The auto-channel mode has been disabled in the profile for this AP.
The Current Status of the plan shows one of the following states:
• None—The power adjustment algorithm has not been manually run since the last switch
reboot.
• Algorithm In Progress—The power adjustment algorithm is running.
• Algorithm Complete—The power adjustment algorithm has finished running.
A table displays to indicate proposed power adjustments. Each entry shows the AP along
with the current and new power levels. To accept the proposed change, click Apply. You
must manually apply the power adjustment for the proposed assignments to be applied.
• Apply In Progress—The switch is adjusting the power levels that the APs use.
• Apply Complete—The algorithm and power adjustment are complete.
NOTE: The APs automatically reset after the code is successfully downloaded.
Table 19 describes the fields you must complete to upgrade D-Link Access Points.
Table 19. AP Upgrade
Field Description
Server Address Enter the IP address of the host where the upgrade file is located. The host
must have a TFTP server installed and running.
File Path Enter the path to the directory where the upgrade file is located. You may
enter up to 96 characters.
Field Description
File Name Enter the name of the upgrade file. You may enter up to 32 characters, and
the file extension “.tar” must be included.
Group Size When you upgrade multiple APs, each AP contacts the TFTP server to
download the upgrade file. To prevent the TFTP server from being
overloaded, you can limit the number of APs to be upgraded at a time.
In the Group Size field, enter the number of APs that can be upgraded at the
same time. When one group completes the upgrade, the next group begins
the process.
Managed AP The combination box lists the APs that the switch manages. Each AP is
identified by its MAC address and location (if specified). To upgrade one or
more APs, select the AP MAC address from the list. To upgrade all APs,
select “All” from the top of the list. The Group Size field limits the number
of simultaneous AP upgrades in order not to overwhelm the TFTP server.
NOTE: We recommend that you upgrade all managed APs at the same time.
After you provide the information about the upgrade file, click Start to begin the upgrade
process. Additional fields appear to provide information about upgrade status and success.
The software download could be aborted while the code transfer is in progress for any AP only
during the time the Abort button is displayed. It still completes the download from the TFTP
server, but does not update its NVRAM. Once the NVRAM update begins for all APs
involved, the Abort button disappears. An activity/progress bar is displayed during the
upgrade. The activity bar is no longer displayed once the upgrade process is complete, that is,
the AP is up and running and managed.
Table 20 describes the fields that appear after you start the AP upgrade process.
Table 20. AP Upgrade Status
Field Description
Download Status This field shows the status of the upgrade process for all APs:
• Not Started—The Unified Switch has not started the download process.
• Requested—A request to download AP software has been made, but the
switch has not done any downloads.
• In Progress—The AP is currently attempting to download software from
the server.
• Success—Download completed successfully on all APs. An AP reports
a successful download to the switch after the software transfers from the
TFTP server to the AP and the code checksum is good. The code must
also match the intended hardware platform.
• Failure—Download failed on all APs. A software download fails if the
AP reports a software download failure due to an inability to contact the
TFTP server or find the upgrade file, or if the AP loses connectivity with
the switch.
Download Count The number in this field shows the number of managed APs to download
software in the current download request. If you selected All for the managed
APs to upgrade, the download count shows the number of managed APs at
the time the download request was started. The value is 1 if only one AP is
being updated.
Success Count The number in this field shows the number of APs that have successfully
downloaded the new code. This value starts with 0 at the beginning of the
download and increases by one for every AP that successfully downloaded
the code.
Failure Count The number in this field shows the number of APs that failed to download
the new code. This value starts with 0 at the beginning of the download and
increases by one for every AP that failed to downloaded the code.
A table also appears and lists each AP, its download status, and the software version it is
downloading. The status for an individual AP can have one of the following values:
• Requested—Download has been requested for this AP.
• Success—The AP reported successful code download.
• Failure—The AP reported a failed code download.
• Code Transfer In Progress—The code download to the AP is in progress.
• NVRAM Update In Progress—The AP NVRAM is being updated.
• Waiting for APs to Download—The code transfer is complete, but the AP is waiting for
the remaining APs to finish downloading and then it will start updating its NVRAM.
• Aborted—The upgrade of the AP was aborted.
Management > Advanced page. From the Advanced page, you can also manually change the
RF channel and power for each radio on an AP.
Each AP managed by the D-Link Unified Switch is listed by its MAC address and location.
The location is based on the value in the RADIUS or local Valid AP database. Table 21
describes the Advanced features you can configure for the AP.
Table 21. Advanced AP Management
Field Description
Debug To help you troubleshoot, you can enable Telnet access to the AP so that you
can debug the device from the CLI.
The Debug field shows the debug status and can be one of the following:
• Disabled
• Set Requested
• Set in Progress
• Enabled
To change the status, click the Debug status link. The Managed AP Debug
page appears. Table 22 describes the fields on the new page.
Channel Click the Channel link to access the Managed AP Channel/Power Adjust
page. From that page, you can set a new channel for Radio 1 or Radio 2. The
available channels depend on the radio mode and country in which the APs
operate. Table 23 describes the fields on the new page.
Power Click the Power link to access the Managed AP Channel/Power Adjust page.
From that page, you can set a new power level for the AP. Table 23 describes
the fields on the new page.
Enabling AP Debugging
You can enable debugging on an AP to allow Telnet access to the access point. Once you
Telnet to the AP, you can issue commands from the CLI to help you troubleshoot.
The fields in Table 22 appear when you click the Debug link for a managed AP on the
Managed AP Advanced page.
Table 22. AP Debug
Field Description
MAC Address Shows the MAC address of the access point.
Location Shows the location of the access point, as configured in the Valid AP data-
base.
IP Address Shows the IP address of the AP.
Status Shows the debug status, which can be one of the following:
• None—Debugging has not been enabled or disabled.
• Set Requested—A request has been made to change the debug status.
• Set Complete—Debugging has been enabled or disabled.
Password Enter the admin password for the AP (the default is admin).
Confirm Password Since the password is encrypted, you must retype the password to confirm
the password.
Enable Debug Select or clear the Enable check box to enable or disable debugging.
Once once you Telnet to the AP, you get an AP interface login prompt. The
user name is admin. Enter the password you set in the previous field. The
default password is admin if you did not specify a new password. From the
AP CLI, you can also access the standard Linux prompt by typing the '!' char-
acter.
You can issue the following debug commands at the Linux OS prompt:
• get management—Display management interface information
• get managed-ap—Display managed AP information
You can issue the following debug commands at the Linux OS prompt:
• ifconfig—display all interfaces.
• cat /proc/meminfo—View memory utilization
Field Description
AP MAC Address Shows the MAC address of the access point.
Radio Displays the radio and its mode. The changes apply only to this radio.
Channel Status The status is one of the following:
• None
• Set Requested
• Set Complete
Field Description
Channel The Channel defines the portion of the radio spectrum that the radio uses for
transmitting and receiving. The range of channels and the default channel are
determined by the Mode of the radio interface.
IEEE 802.11b/802.11g modes (802.11 b/g) support use of channels 1
through 11 inclusive, while IEEE 802.11a mode supports a larger set of non-
consecutive channels (36,40,44, 48, 52, 56, 60, 64, 149, 153, 157, 161, 165).
NOTE: The available channels depends on the country in which the APs
operate.
NOTE: For radios that use 802.11a mode, some countries have a regulatory
domain that requires radar detection. For these countries (based on the
country code setting), the radio automatically uses the 802.11h protocol for
selecting the channel if radar is detected on the statically assigned channel.
Interference can occur when multiple access points within range of each
other are broadcasting on the same or overlapping channels. The impact of
this interference on network performance can intensify during busy times
when a large amount of data and media traffic is competing for bandwidth.
If you select auto, the AP scans the RF area for occupied channels and selects
a channel from the available non-interfering, or clear channels.
If you specify a channel, make sure that the channel does not interfere with
the channel that neighbor APs use.
Power Status The status is one of the following:
• None
• Set Requested
• Set Complete
Power The power level affects how far an AP broadcasts its RF signal. If the power
level is too low, wireless clients will not detect the signal or experience poor
WLAN performance. If the power level is too high, the RF signal might
interfere with other APs within range.
For more information about an item on the Wireless Global Status page, click the value
associated with the item to go to its status page.
Field Description
WLAN Switch This status field displays the operational status of the WLAN Switch. The
Operation Status WLAN Switch may be configured as enabled, but is operationally disabled
due to configuration dependencies. If the operational status is disabled, the
reason will be displayed in the following status field.
The WLAN Switch is composed of multiple components, and each
component in the system must acknowledge an enable or disable of the
WLAN Switch. During a transition the operational status might temporarily
show a pending status.
IP Address IP address of the switch. For information about the switch IP address, see
“Assigning the IP Address to Switches and Managed APs” on page 62.
Peer Switches Number of peer Unified Switches detected on the network.
Field Description
Total Access Total number of Managed APs in the database. This value is always equal to
Points the sum of “Managed Access Points,” “Connection Failed Access Points,”
and “Discovered Access Points.”
Standalone Access Total number of detected D-Link Access Points that are in Standalone Mode.
Points APs in Standalone Mode are not currently managed by a D-Link Unified
Switch.
Managed Access Number of APs in the managed AP database that are authenticated,
Points configured, and have an active connection with the Unified Switch.
Connection Failed Number of APs that were previously authenticated and managed, but
Access Points currently don't have connection with the Unified Switch.
Discovered Access APs that have a connection with the switch but have not been completely
Points configured. This value includes all managed APs with a “Discovered” or
“Authenticated” status.
Rogue Access Number of Rogue APs currently detected on the WLAN. When an AP
Points performs an RF scan, it might detect access points that have not been
validated. It reports these APs as rogues.
Authentication Number of access points that failed to authenticate with the Unified Switch.
Failed Access
Points
Total Clients Total number of clients in the database. This total includes clients with an
“Associated”, “Authenticated”, or “Disassociated” status.
Authenticated Total number of clients in the client database with an “Authenticated” status.
Clients
802.11a Clients Shows the number of clients connected to the 802.11a radio frequency.
802.11b/g Clients Shows the number of clients connected to the 802.11b/g radio frequency.
Black-listed Shows the number of clients that are configured to be disallowed to associate
Clients with any AP that uses the default AP profile.
WLAN Utilization Total network utilization across all APs managed by this switch. This is
based on global statistics.
WLAN Bytes Total bytes transmitted across all APs managed by the switch.
Transmitted
WLAN Bytes Total bytes received across all APs managed by the switch.
Received
WLAN Packets Total packets transmitted across all APs managed by the switch.
Transmitted
WLAN Packets Total packets received across all APs managed by the switch.
Received
Peer switches do not exchange configuration profiles or additional data about their managed
APs. This means that you cannot view any other status or statistics for a managed AP from a
peer switch. However, switches do use shared information for rogue AP detection.
Table 25 describes the fields available on the Peer Switch Status page.
Table 25. Peer Switch Status
Field Description
IP Address IP address of the peer Unified Switch managed in the peer group.
Vendor ID Vendor of the peer switch software.
Software Version The software version for the given peer switch.
Protocol Version Version of WS software on the peer switch.
Discovery Reason The discovery method of the given peer switch, which can be one of the
following methods:
• L2 Poll
• IP Poll
Age Time since last communication with the switch in Hours, Minutes, and
Seconds.
The font color for the AP listing indicates that the AP is one of the following types:
• Green—Managed AP
• Red—Failed AP
• Gray—Rogue AP
• Amber—Peer Managed AP
You can manually delete status entries. To clear all APs from the All Access Points status page
except Managed Access Points, click Delete All.
To configure an Authentication Failed AP to be managed by the switch the next time it is
discovered, select the check box next to the MAC address of the AP and click Manage. You
will be presented with the Valid Access Point Configuration page. You can then configure the
AP and click Submit to save the AP in the local Valid AP database. If you use a RADIUS
server for AP validation, you must add the MAC address of the AP to the AP database on the
RADIUS server. For more information, see Appendix B, “Configuring the External RADIUS
Server” on page 201.
To identify an AP as an Acknowledged Rogue, select the check box next to the MAC address
of the AP and click Acknowledge. The switch adds the AP to the Valid AP database as an
Acknowledged Rogue.
To identify an AP as a rogue (again), select the check box next to the MAC address of the
acknowledged AP and click UnAcknowledge.The switch deletes the AP from the Valid AP
database.
To view additional information about the detected AP, click the MAC address of the AP.
Table 26 describes the fields on the All Access Points page.
Table 26. Monitoring All Access Points
Field Description
MAC Address Shows the MAC address of the access point.
Location A location description for the AP. This is the value configured in the valid
AP database (either locally or on the RADIUS server).
Switch Port The physical port (in the slot/port format) on the switch that the AP is
connected to either directly or indirectly in the same L3 domain. If the AP is
beyond the L3 network boundary, then ‘Unknown’ is displayed.
IP Address The network address of the access point.
Software Version Shows the version of D-Link Access Point software that the AP is running.
Age Shows how much time has passed since the AP was last detected and the
information was last updated.
Field Description
Status Shows the access point status:
• Managed—The AP profile configuration has been applied to the AP and
it's operating in managed mode.
• No Database Entry—The MAC address of the AP does not appear in the
local or RADIUS Valid AP database.
• Authentication (Failed AP)—The AP failed to be authenticated by the
Unified Switch or RADIUS server.
• Failed—The Unified Switch lost contact with the AP; a failed entry will
remain in the managed AP database unless you remove it. Note that a
managed AP will temporarily show a failed status during a reset.
• Rogue—The AP has not attempted to contact the switch, and the MAC
address of the AP is not in the Valid AP database.
• Acknowledged Rogue—The AP has been acknowledged as a known
rogue, and its MAC address of the AP is in the Valid AP database.
Profile The AP profile configuration currently applied to the managed AP. The
profile is assigned to the AP in the valid AP database.
NOTE: Once an AP is discovered and managed by the Unified Switch, if the
profile is changed in the valid AP database (either locally or on the RADIUS
server) the AP is automatically reset when a new profile is assigned.
Radio Shows the wireless radio mode that each radio on the AP is using. The
D-Link DWL-3500AP access point has one radio, and the D-Link
DWL-8500AP access point has two radios.
Channel Shows the operating channel for the radio.
Authenticated Shows the number of wireless clients that are associated and authenticated
Clients with the access point per radio.
NOTE: Some status values for some APs in the All Access Points list are not
available. Those are listed as N/A.
NOTE: You can sort the list of APs by any of the column heading except for Radio,
Channel, and Authenticated Clients. For example, to sort the APs by the
profile they use, click Profile.
The following tabs are available from the Managed AP Status page:
• Summary—Lists the APs managed by the switch and provides summary information
about them.
• Detail—Shows detailed status information collected from the AP.
• Radio Summary—Shows the channel, transmit power, and number of associated wireless
clients for all managed APs.
• Radio Detail—From the Radio Summary page, click the MAC address of the AP to view
detailed status for a radio interface. Use the radio button to navigate between the two radio
interfaces.
• Neighbor APs—Shows the neighbor APs that the specified AP has discovered through
periodic RF scans on the selected radio interface.
• Neighbor Clients—Shows information about wireless clients associated with an AP or
detected by the AP radio.
• VAP—Shows summary information about the virtual access points (VAPs) for the
selected AP and radio interface on the APs that the switch manages.
Table 27 describes the fields you see on the Summary page for the managed access point
status.
Table 27. Managed Access Point Status
Field Description
MAC Address The Ethernet address of the Unified Switch managed AP.
Location A location description for the AP. This is the value configured in the valid
AP database (either locally or on the RADIUS server).
Field Description
Switch Port The physical port (in the slot/port format) on the switch that the AP is
connected to either directly or indirectly in the same L3 domain. If the AP is
beyond the L3 network boundary, then ‘Unknown’ is displayed.
IP Address The network IP address of the managed AP.
Software Version The software version the AP is currently running.
Age Time since last communication between the WDS and the AP.
Status The current managed state of the AP. The possible values are:
• Discovered - The AP is discovered and by the switch, but is not yet
authenticated.
• Authenticated - The AP has been validated and authenticated (if
authentication is enabled), but it is not configured.
• Managed - The AP profile configuration has been applied to the AP and
it's operating in managed mode.
• Failed - The Unified Switch lost contact with the AP, a failed entry will
remain in the managed AP database unless you remove it. Note that a
managed AP will temporarily show a failed status during a reset.
Configuration This status indicates if the AP is configured successfully with the assigned
Status profile. The status is one of the following:
• Not Configured - The profile has not been sent to the AP yet, the AP
may be discovered but not yet authenticated.
• In Progress - The switch is currently sending the AP profile
configuration packet to the AP.
• Success - The entire profile has been sent to the AP and there were no
configuration errors.
• Partial Success - The entire profile has been sent to the AP and there
were configuration errors (for example, some configuration parameters
were not accepted), but the AP is operational.
• Failure - The profile has been sent to the AP and there were
configuration errors, the AP is not operational.
Profile The AP profile configuration currently applied to the managed AP, the
profile is assigned to the AP in the valid AP database.
NOTE: Once an AP is discovered and managed by the Unified Switch, if the
profile is changed in the valid AP database (either locally or on the RADIUS
server) the AP must be reset to configure with the new profile.
Radio Shows the wireless radio mode that each radio on the AP is using. The
D-Link DWL-3500AP access point has one radio, and the D-Link
DWL-8500AP access point has two radios.
Channel Shows the operating channel for the radio.
Authenticated Shows the number of wireless clients associated and associated with the
Clients access point per radio.
NOTE: You can sort the list of APs by any column heading except Radio, Channel,
and Authenticated Clients. For example, to sort the APs by the profile they
use, click Profile.
To view detailed information about an AP that the switch manages, select the MAC address of
the AP from the drop-down menu above the table that displays the detailed information. Click
the Reset button to reset the managed AP. A pop-up asks you to confirm that you want to reset
the AP. Any wireless clients associated with the access point will be disassociated. To refresh
the status information for the AP, click Refresh
Table 28 describes the fields you see on the Detail page for the managed access point status.
Table 28. Detailed Managed Access Point Status
Field Description
MAC Address - The label at the top of the table shows the MAC address and location of the
Location AP. The location is the value configured in the Valid AP database.
Hardware Type Type of the AP hardware. It is either DWL-8500AP or DWL-3500AP.
Switch Port The physical port (in the slot/port format) on the switch that the AP is
connected to either directly or indirectly in the same L3 domain. If the AP is
beyond the L3 network boundary, then ‘Unknown’ is displayed.
IP Address The network IP address of the managed AP.
Profile The AP profile configuration currently applied to the managed AP, the
profile is assigned to the AP in the valid AP database. Note: Once an AP is
discovered and managed by the Unified Switch, if the profile is changed in
the valid AP database (either locally or on the RADIUS server) the AP must
be reset to configure with the new profile.
Status The current managed state of the AP. The possible values are:
• Discovered - The AP is discovered and by the switch, but is not yet
authenticated.
• Authenticated - The AP has been validated and authenticated (if
authentication is enabled), but it is not configured.
• Managed - The AP profile configuration has been applied to the AP and
it's operating in managed mode.
• Failed - The Unified Switch lost contact with the AP, a failed entry will
remain in the managed AP database unless you remove it. Note that a
managed AP will temporarily show a failed status during a reset.
Discovery Reason This status value indicates how the managed AP was discovered, the status is
one of the following values:
• IP Poll Received - The AP was discovered via an IP poll from the
Unified Switch, its IP address is configured in the IP polling list.
• Peer Redirect - The AP was discovered through a peer switch redirect,
the AP tried to associate with another peer switch and learned the
current Unified Switch IP address from the peer (peer learned Unified
Switch IP address in RADIUS server response when validating the AP).
• Switch IP Configured - The managed AP is configured with the Unified
Switch IP address.
• Switch IP DHCP - The managed AP learned the current Unified Switch
IP address through DHCP option 43.
• L2 Poll Received - The AP was discovered through the D-Link Wireless
Device Discovery protocol.
Field Description
Configuration This status indicates if the AP is configured successfully with the assigned
Status profile. The status is one of the following:
• Not Configured - The profile has not been sent to the AP yet, the AP
may be discovered but not yet authenticated.
• In Progress - The switch is currently sending the AP profile
configuration packet to the AP.
• Complete Success - The entire profile has been sent to the AP and there
were no configuration errors.
• Partial Success - The entire profile has been sent to the AP and there
were configuration errors, but the AP is operational.
• Failure - The profile has been sent to the AP and there were
configuration errors, the AP is not operational.
Protocol Version Indicates the protocol version supported by the software on the AP, this is
learned from the AP during discovery.
Software Version Indicates the version of software on the AP, this is learned from the AP
during discovery.
Last Failing If the configuration status indicates a partial success or complete failure, this
Configuration field indicates the last element that failed during configuration. This field is
Element only visible if there is a failed element.
Configuration If the configuration status indicates a partial success or complete failure, this
Failure Error field contains an ASCII string filled in by the AP containing the error
Message message for the last failing configuration element.
Code Download This indicates the current status of a code download request for this AP. The
Status possible values include the following:
• Not Started - A code download has not been requested for the AP.
• Requested - A code download has been requested for the AP, the switch
has not processed the request.
• In Progress - The switch is processing a code download request for the
AP.
• Success - The AP has successfully downloaded the new software image.
• Failure - The AP failed to download the new software image.
Associated Clients Total number of clients currently associated to the AP. This is the sum of all
associated clients for all the VAPs enabled on the AP. Association is a
transitional state.
Authenticated Total number of clients currently authenticated to the AP. This is the sum of
Clients all authenticated clients for all the VAPs enabled on the AP.
System Uptime Time in seconds since last power-on reset of the managed AP.
Age Time since last communication between the WDS and the AP.
You can view general information about each operational radio on all APs managed by the
switch. The Managed Access Point Radio Summary page shows the channel, transmit power,
and number of associated wireless clients for all managed APs. For more information about a
specific radio on an AP, click the radio.
Table 29 describes the fields you see on the Radio Summary page for the managed access
point status.
Table 29. Managed AP Radio Summary
Field Description
MAC Address The Ethernet address of the Unified Switch managed AP.
Location A location description for the AP, this is the value configured in the valid AP
database (either locally or on the RADIUS server).
Radio Indicates the radio interface and configured mode of the radio, if the radio is
disabled the radio mode will be displayed as Off instead of showing the
configured mode.
Channel If radio is operational, the current operating channel for the radio.
Transmit Power If radio is operational, the current transmit power for the radio.
Associated Clients Total count of clients associated on the physical radio, this is a sum of all the
clients associated to each VAP enabled on the radio.
Authenticated Total number of clients currently associated to the AP that have been
Clients authenticated. This is the sum of all authenticated clients for all the VAPs
enabled on the radio.
You can view detailed information about each radio on the APs that the Unified Switch
manages on the Radio Detail page for the managed access point radio status.
Table 30 describes the fields you see on the Radio Detail page for the managed access point
status.
Table 30. Managed AP Radio Detail
Field Description
MAC Address - Shows the MAC address and location of the AP to which the values on the
Location page apply. To view details about a different AP, select its MAC address
(Drop-down Menu) from the drop-down menu.
Radio Indicates the radio interface and configured mode of the radio, if the radio is
disabled the radio mode will be displayed as Off instead of showing the
configured mode.
Supported The list of eligible channels the AP reported to the switch for channel
Channels assignment. The list is based on country code, hardware capabilities, and any
configured channel limitations.
Channel If radio is operational, the current operating channel for the radio.
Associated Clients Total count of clients associated on the physical radio, this is a sum of all the
clients associated to each VAP enabled on the radio.
Authenticated Total count of clients authenticated on the physical radio, this is a sum of all
Clients the clients authenticated to each VAP enabled on the radio.
Transmit Power If radio is operational, the current transmit power for the radio.
Authenticated Total count of clients authenticated clients on the physical radio, this is a sum
Clients of all the clients authenticated to each VAP enabled on the radio.
Field Description
Fixed Channel This flag indicates if a fixed channel is configured and assigned to the radio,
Indicator a fixed channel can be configured in the valid AP database (locally or on a
RADIUS server).
Fixed Power This flag indicates if a fixed power setting is configured and assigned to the
Indicator radio, a fixed transmit power can be configured in the valid AP database
(locally or on a RADIUS server).
Manual Channel Indicates the current state of a manual request to change the channel on this
Adjustment Status radio. The valid values are:
• Not Started - No request has been made to change the channel.
• Requested - A channel change has been requested by the user but has not
been processed by the switch.
• In Progress - The switch is processing a channel change request for this
radio.
• Success - A channel change request is complete.
• Failure - A channel change request failed.
Manual Power Indicates the current state of a manual request to change the power setting on
Adjustment Status this radio. The valid values are:
• None - No request has been made to change the power.
• Requested - A power adjustment has been requested by the user but has
not been processed by the switch.
• In Progress - The switch is processing a power adjustment request for
this radio.
• Success - A power adjustment request is complete.
• Failure - A power adjustment request failed.
WLAN Utilization Indicates the total network utilization for the physical radio, this value is
based on radio statistics.
Total Neighbors Total number of neighbors (both APs and clients) that can be seen by this
radio in its RF area.
During the RF scan, an access point collects and stores beacon information visible from
neighboring access points. Access points can store the neighbor information for up to 64
neighbor APs. If the neighbor scan information exceeds the capacity the oldest data in the
neighbor list is overwritten.
The Delete All Neighbors button clears the list. The list is repopulated as neighbors are
discovered.
Table 31 describes the fields you see on the Neighbor APs page for the managed access point
status.
Table 31. Managed AP Neighbor Status
Field Description
MAC Address - Shows the MAC address and location of the AP to which the values on the
Location page apply. To view details about a different AP, select its MAC address
(Drop-down Menu) from the drop-down menu.
Radio Indicates a radio interface and its configured mode. Select one of the radios
(ex. 1-802.11g) to view the neighbor APs detected via an RF scan on that radio.
Neighbor AP MAC The Ethernet MAC address of the neighbor AP network, this could be a
physical radio interface or VAP MAC address. For D-Link Access Points this
is always a VAP MAC address. The neighbor AP MAC address may be
cross-referenced in the RF Scan status.
SSID Service Set ID of the neighbor AP network.
RSSI Received signal strength indication, this is an indicator of the signal strength
relative to the neighbor and may give an idea of the neighbor's distance from
the managed AP.
Status Indicates the managed status of the AP, whether this is a valid AP known to
the switch or a Rogue on the network. The valid values are:
• WS Managed - The neighbor AP is managed by this switch, the
neighbor AP status can be referenced using its base MAC address.
• Peer WS Managed - The neighbor AP is managed by another switch
within the peer group.
• Acknowledged Rogue - The AP is configured as a valid AP entry (local
or RADIUS), it has been acknowledged and is not reported as Rogue.
• Ad Hoc Rogue - The AP neighbor was detected participating in an ad
hoc network.
Age Indicates the time since this AP was last reported from an RF scan on the
radio.
The Neighbor Clients page shows information about wireless clients that have been
discovered by the selected AP. D-Link Access Points can store information for up to 1024
wireless clients. If the information exceeds the capacity, the oldest data in the neighbor client
list is overwritten. The Delete All Neighbors button clears the list. The list is repopulated as
neighbors and associated clients are discovered.
Table 32 describes the fields you see on the Neighbor Clients page for the managed access
point status.
Table 32. Neighbor AP Clients
Field Description
MAC Address - Shows the MAC address and location of the AP to which the values on the
Location page apply. To view details about a different AP, select its MAC address
(Drop-down Menu) from the drop-down menu.
Radio Indicates a radio interface and its configured mode. Select one of the radios
(ex. 1-802.11g) to view the neighbor clients detected on that radio.
There are eight virtual access points (VAPs) available on each radio of an AP. For each radio
of an access point managed by the switch, you can view a summary of the VAP configuration
and the number of wireless clients associated with a particular VAP.
Table 33 describes the fields you see on the VAPs page for the managed access point status.
Table 33. Managed Access Point VAP Status
Field Description
MAC Address - Shows the MAC address and location of the AP to which the values on the
Location page apply. To view details about a different AP, select its MAC address
(Drop-down Menu) from the drop-down menu.
Radio Indicates a radio interface and its configured mode. Select one of the radios
(ex. 1-802.11g) to view VAP status for that radio.
VAP ID The integer ID used to identify the VAP (0-7), this is used to uniquely
identify the VAP for configuration via CLI/SNMP.
VAP Mode Indicates whether or not the VAP is enabled or disabled. VAPs are always
configured, but are only sending beacons and accepting clients when they are
Enabled.
BSSID The Ethernet address of the VAP.
SSID Indicates the network assigned to the VAP. The network for each VAP is
configured within the AP profile and the SSID is based on the network
configuration.
Client Associations Indicates the total number of clients currently associated to the VAP.
Client Indicates the total number of clients currently authenticated with the VAP.
Authentications
The following tabs are available from the Managed AP Statistics page:
• WLAN Summary—Shows summary information about the wireless interfaces on each
AP the switch manages.
• Ethernet Summary—Shows summary information about the Ethernet (wired) interfaces
on each AP the switch manages.
134 © 2001- 2008 D-Link Corporation/D?Link Corporation. All Rights Reserved.
7 Monitoring Status and Statistics
• Detail—Shows the number and type of packets transmitted and received on a specific AP.
• Radio—Shows per-radio information about the number and type of packets transmitted
and received for a specific AP.
• VAP—Shows per-VAP information about the number of packets transmitted and received
and the number of wireless client failures for a specific AP
On the WLAN Summary and Ethernet Summary pages, click the MAC address of the AP to
view detailed statistics about the AP.
Table 34. Managed Access Point WLAN Summary Statistics
Field Description
MAC Address The Ethernet address of the Unified Switch managed AP.
Packets Received Total packets received by the AP on the wireless network.
Bytes Received Total bytes received by the AP on the wireless network.
Packets Transmitted Total packets transmitted by the AP on the wireless network.
Bytes Transmitted Total bytes transmitted by the AP on the wireless network.
NOTE: You can sort the list of APs by any of the column heading. For example, to
sort the APs by the number of packets transmitted, click Packets
Transmitted.
The Ethernet summary statistics show information about the number of packets and bytes
transmitted and received on the wired interface of each access point managed by the switch.
The wired interface is physically connected to the LAN.
Table 35 describes the fields you see on the Ethernet Summary page for the managed access
point statistics.
Table 35. Managed Access Point Ethernet Summary Statistics
Field Description
MAC Address The Ethernet address of the Unified Switch managed AP.
Packets Received Total packets received by the AP on the wired network.
Bytes Received Total bytes received by the AP on the wired network.
Packets Transmitted Total packets transmitted by the AP on the wired network.
Bytes Transmitted Total bytes transmitted by the AP on the wired network.
The detailed AP statistics show information about the packets and bytes transmitted and
received on the wired and wireless interface of a particular access point managed by the
switch.
Table 36 describes the fields you see on the Detail page for the managed access point
statistics.
Table 36. Detailed Managed Access Point Statistics
Field Description
MAC Address -Location Shows the MAC address and location of the AP to which the
(Drop-down Menu) values on the page apply. To view details about a different AP,
select its MAC address from the drop-down menu.
WLAN Packets Received Total packets received by the AP on the wireless network.
WLAN Bytes Received Total bytes received by the AP on the wireless network.
WLAN Packets Transmitted Total packets transmitted by the AP on the wireless network.
WLAN Bytes Transmitted Total bytes transmitted by the AP on the wireless network.
Ethernet Packets Received Total packets received by the AP on the wired network.
Ethernet Bytes Received Total bytes received by the AP on the wired network.
Ethernet Packets Transmitted Total packets transmitted by the AP on the wired network.
Ethernet Bytes Transmitted Total bytes transmitted by the AP on the wired network.
Multicast Packets Received Total multicast packets received by the AP on the wired
network.
Total Receive Errors Total receive errors detected by the AP on the wired network.
Total Transmit Errors Total transmit errors detected by the AP on the wired network.
The radio statistics show detailed information about the packets and bytes transmitted and
received on the radio (wireless) interface of a particular access point managed by the switch.
Table 37 describes the fields you see on the Radio page for the managed access point
statistics.
Table 37. Managed Access Point Radio Statistics
Field Description
MAC Address -Location Shows the MAC address and location of the AP to which the
(Drop-down Menu) values on the page apply. To view details about a different
AP, select its MAC address from the drop-down menu.
WLAN Packets Received Total packets received by the AP on this radio interface.
WLAN Bytes Received Total bytes received by the AP on this radio interface.
WLAN Packets Transmitted Total packets transmitted by the AP on this radio interface.
WLAN Bytes Transmitted Total bytes transmitted by the AP on this radio interface.
Fragments Received Count of successfully received MPDU frames of type data or
management.
Fragments Transmitted Number of transmitted MPDU with an individual address or
an MPDU with a multicast address of type Data or
Management.
Multicast Frames Received Count of MSDU frames received with the multicast bit set in
the destination MAC address.
Field Description
Multicast Frames Transmitted Count of successfully transmitted MSDU frames where the
multicast bit is set in the destination MAC address.
Duplicate Frame Count Number of times a frame is received and the Sequence
Control field indicates is a duplicate.
Failed Transmit Count Number of times a MSDU is not transmitted successfully due
to transmit attempts exceeding either the short retry limit or
the long retry limit.
Transmit Retry Count Number of times a MSDU is successfully transmitted after
one or more retries.
Multiple Retry Count Number of times a MSDU is successfully transmitted after
more than one retry.
RTS Success Count Count of CTS frames received in response to an RTS frame.
RTS Failure Count Count of CTS frames not received in response to an RTS
frame.
ACK Failure Count Count of ACK frames not received when expected.
FCS Error Count Count of FCS errors detected in a received MPDU frame.
Frames Transmitted Count of each successfully transmitted MSDU.
WEP Undecryptable Count Count of encrypted frames received and the key configuration
of the transmitter indicates that the frame should not have
been encrypted or that frame was discarded due to the
receiving station not implementing the privacy option.
The VAP statistics show information about the client failures and number of packets and bytes
transmitted and received on each VAP on radio one or two for a particular access point
managed by the switch.
Table 38 describes the fields you see on the VAP page for the managed access point statistics.
Table 38. Managed Access Point VAP Statistics
Field Description
MAC Address -Location Shows the MAC address and location of the AP to which the
(Drop-down Menu) values on the page apply. To view information about a different
AP, select its MAC address from the drop-down menu.
Radio Indicates a radio interface and its configured mode. Select one of
(ex. 1-802.11g) the radios to view its VAP statistics.
VAP ID Select one of the 8 VAPs from the drop-down menu to display its
statistics. All VAPs are available regardless of whether they are
enabled.
WLAN Packets Received Total packets received by the AP on this VAP.
WLAN Bytes Received Total bytes received by the AP on this VAP.
WLAN Packets Transmitted Total packets transmitted by the AP on this VAP.
Field Description
WLAN Bytes Transmitted Total bytes transmitted by the AP on this VAP.
Client Association Failures Number of clients that have been denied association to the VAP.
Client Authentication Number of clients that have failed authentication to the VAP.
Failures
The AP authentication failure list shows information about APs that failed to establish
communication with the D-Link Unified Switch. The AP can fail due to one of the following
reasons:
• No Database Entry—The MAC address of the AP is not in the local Valid AP database or
the external RADIUS server database, so the AP has not been validated.
• Authentication—The authentication password configured in the AP did not match the
password configured in the local database or RADIUS database.
To delete the entries for all APs from the failure list, click Delete All. To configure an
Authentication Failed AP to be managed by the switch the next time it is discovered, select the
check box next to the MAC address of the AP and click Manage. You will be presented with
the Valid Access Point Configuration page. You can then configure the AP and click Submit
to save the AP in the local Valid AP database.
If you use a RADIUS server for AP validation, you must add the MAC address of the AP to
the RADIUS server database. For more information, see Appendix B, “Configuring the
External RADIUS Server” on page 201.
Click the MAC address of the AP to view more information about the AP. If the AP is not a
D-Link Access Point, some values are unknown.
To view additional data (beacon information) for an AP in the failure list, you can search for
the MAC address of the failed AP on the Rogue/RF Scan page. However, some APs that
attempt to contact the switch on the wired network might not be detected during the RF scan.
Table 39. Access Point Authentication Failure Status
Field Description
MAC Address The Ethernet address of the AP.
IP Address The network IP address of the AP.
Last Failure Type Indicates the last type of failure that occurred.
Vendor ID Vendor of the AP software.
Validation Failures The count of association failures for this AP.
Authentication Failures The count of authentication failures for this AP.
Protocol Version Indicates the protocol version supported by the software on the
AP.
Software Version Indicates the version of software on the AP.
Hardware Type Hardware platform for the AP.
Age Time in seconds since failure occurred.
Status entries in the RF Scan list are collected at a point in time and eventually age out. The
age value for each entry shows how long ago the switch recorded the entry. You can configure
the age out time for status entries on the Administration > Advanced Configuration >
Global page. You can also manually delete status entries. To clear all APs from the RF scan
list, click Delete All.
To configure a Rogue AP to be managed by the switch the next time it is discovered, select the
check box next to the MAC address of a detected AP and click Manage. You will be presented
with the Valid Access Point Configuration page. You can then configure the AP and click
Submit to save the AP in the local Valid AP database. If you use a RADIUS server for AP
validation, you must add the MAC address of the AP to the AP database on the RADIUS
server. For more information, see Appendix B, “Configuring the External RADIUS Server” on
page 201.
To identify an AP as an acknowledge rogue, select the check box next to the MAC address of
the AP and click Acknowledge. The switch adds the AP to the Valid AP database as an
Acknowledged Rogue. To identify an AP as a rogue (again), select the check box next to the
MAC address of the acknowledged AP and click UnAcknowledge. The switch deletes the AP
from the Valid AP database.
When you manage or acknowledge a rogue AP, the switch adds an entry to the valid AP
database but does not change the entry on the RF Scan Status page. However, the next time the
switch discovers the AP, its entry in the RF Scan Status list will be handled based on the
change.
To view additional information about the detected AP, click the MAC address of the AP.
The detailed status for access points detected during the RF scan shows the information on the
summary page plus some additional information learned from the beacon frame, such as
transmission rate.
The following table shows the information the Access Point RF Scan Status page shows for an
individual access point.
Field Description
MAC Address The Ethernet MAC address of the detected AP, this could be a physical radio
interface or VAP MAC. For D-Link Access Points this is always a VAP
MAC address.
SSID Service Set ID of the network, this is broadcast in detected beacon frame.
Physical Mode Indicates the 802.11 mode being used on the AP.
Channel Transmit channel of the AP.
Status Indicates the managed status of the AP, whether this is a valid AP known to
the switch or a Rogue on the network. The valid values are:
• WS Managed - The neighbor AP is managed by this switch, the
neighbor AP status can be referenced using its base MAC address.
• Peer WS Managed - The neighbor AP is managed by another switch
within the peer group.
• Acknowledged Rogue - The AP is configured as a valid AP entry (local
or RADIUS), it has been acknowledged and is not reported as Rogue.
• Ad Hoc Rogue - The AP neighbor was detected participating in an ad
hoc network.
Transmit Rate Indicates the rate at which the AP is currently transmitting data.
Beacon Interval Beacon interval for the neighbor AP network.
Discovered Age Time in seconds since this AP was first detected in an RF scan.
Age Time in seconds since this AP was last detected in an RF scan.
• Status—Shows status information about wireless clients that are associated with APs
managed by the switch and contains the following information:
- Summary—Shows basic information about associated clients.
- Detail—Shows more detailed information about associated clients, such as which
VLAN the client is assigned to and how long the client has been inactive.
- Neighbor APs—Shows the managed APs that are within range of the wireless clients,
which can help you determine the managed AP an associated client might use for
roaming.
• SSID Status—Shows the SSID and client MAC address of all clients connected to
specific networks.
• VAP Status—Shows the clients associated with a specific VAP on a D-Link Access Point
• Statistics—Shows statistics about wireless clients that are associated with APs managed
by the switch and contains the following information:
- Association Summary—Shows the statistics for a wireless client while it is associated
with a single AP.
- Session Summary—If a wireless client roams among different managed APs, the
switch can track the statistics for the entire session.
- Association Detail—Shows additional information about packets the associated client
transmits and receives during association with a single managed AP.
- Session Detail—Shows additional information about packets the associated client
transmits and receives during a session, which can include statistics for one or more
managed AP associations if the client has roamed.
Since the associated client database supports roaming across APs, an entry is not removed
when a client disassociates from a specific AP. After a client has disassociated the entry is
deleted after the client times out. You configure the timeout value in the Client Roam Timeout
field on the WLAN > Administration > Advanced Configuration > Global page. The
timeout value corresponds to the time allowed for roaming to another managed AP.
Field Description
MAC Address The Ethernet address of client station.
AP MAC Address The Ethernet MAC address of the AP that the client is associated with.
SSID Indicates the network on which the client is connected.
Tunnel IP Address If the client is using an L3 Tunnel, this field shows the IP address of the
client. Otherwise, this field is blank.
Location The location of the AP that the client is associated with. The AP location is
configured in the Valid AP database.
Channel Indicates the operating channel for the client association.
Radio The mode of the radio that the wireless client is using.
Field Description
Encryption The security that the wireless client is using to connect to the WLAN.
Protocol
Status Indicates whether or not the client has associated and/or authenticated. The
valid values are:
• Associated - The client is current associated to the managed AP.
• Authenticated - The client is currently associated and authenticated to
the managed AP.
• Disassociated - The client has disassociated from the managed AP, if the
client does not roam to another managed AP within the client roam
timeout, it will be deleted.
For each client associated with an AP that the switch manages, you can view detailed status
information about the client and its association with the access point.
Table 42 describes the information available on the Detail page for the associated client status.
Table 42. Detailed Associated Client Status
Field Description
MAC Address The Ethernet address of client station. To view details about a different
client, select its MAC address from the drop-down menu.
SSID Indicates the network on which the client is connected.
AP MAC Address MAC address of the AP to which this client is associated.
BSSID Indicates the Ethernet MAC address for the managed AP VAP where this
client is associated.
Location Location of the AP to which this client is associated.
Status Indicates whether or not the client has associated and/or authenticated. The
valid values are:
• Associated - The client is current associated to the managed AP.
• Authenticated - The client is currently associated and authenticated to
the managed AP.
• Disassociated - The client has disassociated from the managed AP, if the
client does not roam to another managed AP within the client roam
timeout, it will be deleted.
Radio Indicates the radio on which the client is associated.
Channel Indicates the operating channel for the client association.
VLAN If client is on a VAP using VLAN data forwarding mode, indicates the
current assigned VLAN.
User Name Indicates the user name of client that have authenticated via 802.1X, clients
on networks with other security modes will not have a user name.
Transmit Data Indicates the rate at which the client station is currently transmitting data.
Rate
Field Description
Inactive Period For current association, period of time that the AP has not seen any traffic for
the client.
Age Indicates the time in seconds since the switch has received new association
data for this client.
Tunnel IP Address This field is blank for all non-tunneled clients. For a tunneled client, this is
the assigned tunnel IP address.
Captive Portal This field appears only if the wireless client has accessed the network
through a captive portal and has been authenticated by the switch.
To view additional information about the client’s captive portal connection,
click “Authenticated,” which links to the detailed client information
accessible from the Captive Portal > Client Connection Status page.
The Neighbor AP page for the associated client status shows information about access points
that the client detects. The information on this page can help you determine the managed AP
an associated client might use for roaming.
Table 43 describes the information available on the Neighbor AP page for the associated
client status.
Table 43. Associated Client Neighbor AP Status
Field Description
MAC Address Shows the MAC address of the client to which the values on the page apply.
(Drop-down Menu) To view details about a different associated client, select its MAC address
from the drop-down menu.
AP MAC Address The base Ethernet address of the Unified Switch-managed AP.
Location The configured descriptive location for the managed AP
Radio The radio interface and its configured mode that detected this client as a
neighbor.
Discovery Reason Indicates one or more discovery methods for the neighbor client. One or
more of the following values may be displayed:
• RF Scan - The client was reported from an RF scan on the radio. Note
that client stations are difficult to detect via RF scan, the other methods
are more common for client neighbor detection.
• Probe Request - The managed AP received a probe request from the
client.
• Associated to Managed AP- This neighbor client is associated to another
managed AP.
• Associated to this AP - The client is associated to this managed AP on
the displayed radio.
• Associated to Peer AP - The client is associated to an AP managed by a
peer switch.
• Ad Hoc Rogue - The client was detected as part of an ad hoc network
with this AP.
Field Description
SSID Indicates the network on which the client is connected.
MAC Address The Ethernet address of client station.
Channel Indicates the operating channel for the client association.
Status Indicates whether or not the client has associated and/or authenticated. The
valid values are:
• Associated - The client is current associated to the managed AP.
• Authenticated - The client is currently associated and authenticated to
the managed AP.
• Disassociated - The client has disassociated from the managed AP, if the
client does not roam to another managed AP within the client roam
timeout, it will be deleted.
Field Description
BSSID Indicates the Ethernet MAC address for the managed AP VAP where this
client is associated.
SSID The SSID the client is using to connect to the WLAN.
AP MAC Address This field indicates the base AP Ethernet MAC address for the managed AP.
Location The descriptive location configured for the managed AP.
Radio Displays the managed AP radio interface the client is associated to and its
configured mode.
Client MAC The Ethernet address of client station.
Address
Client IP Address Shows the IP address of the client associated with the VAP.
The statistics on the Association Summary page show information about the traffic a wireless
client receives and transmits while it is associated with a single AP.
Field Description
MAC Address The Ethernet address of client station.
Packets Received Packets received from the client station.
Bytes Received Bytes received from the client station.
Packets Transmitted Packets transmitted to the client station.
Bytes Transmitted Bytes transmitted to the client station.
The statistics on the Session Summary page show information about the traffic a wireless
client receives and transmits while it is connected to the same WLAN network shared by APs
that the switch manages.
If the client roams from one AP to another AP but remains connected to the same network, the
session continues and the session statistics continue to accumulate. If the client closes the
wireless connection or roams out of the range of an AP managed by the switch, the session
ends.
Field Description
MAC Address The Ethernet address of client station.
Packets Received Packets received from the client station.
Bytes Received Total bytes received from the client station.
Packets Transmitted Total packets transmitted to the client station.
Bytes Transmitted Total bytes transmitted to the client station.
The statistics on the Association Detail page show information about the traffic a wireless
client receives and transmits while it is associated with a single AP.
Field Description
MAC Address Shows the MAC address of the client to which the values on the
(Drop-down Menu) page apply. To view details about a different associated client,
select its MAC address from the drop-down menu.
Packets Received Total packets received from the client station.
Bytes Received Total bytes received from the client station.
Packets Transmitted Total packets transmitted to the client station.
Bytes Transmitted Total bytes transmitted to the client station.
Fragments Received Total fragmented packets received from the client station.
Fragments Transmitted Total fragmented packets transmitted to the client station.
Transmit Retries Number of times transmits to client station succeeded after one
or more retries.
Field Description
Transmit Retries Failed Number of times transmits to client station failed after one or
more retries.
Duplicates Received Total duplicate packets received from the client station.
The statistics on the Session Detail page show information about the traffic a wireless client
receives and transmits while it is connected to the same WLAN network shared by APs that
the switch manages.
Field Description
MAC Address Shows the MAC address of the client to which the values on the
(Drop-down Menu) page apply. To view details about a different associated client,
select its MAC address from the drop-down menu.
Packets Received Total packets received from the client station.
Bytes Received Total bytes received from the client station.
Packets Transmitted Total packets transmitted to the client station.
Bytes Transmitted Total bytes transmitted to the client station.
Fragments Received Total fragmented packets received from the client station.
Fragments Transmitted Total fragmented packets transmitted to the client station.
Transmit Retries Number of times transmits to client station succeeded after one
or more retries.
Transmit Retries Failed Number of times transmits to client station failed after one or
more retries.
Duplicates Received Total duplicate packets received from the client station.
To view a list of clients that fail to associate or authenticate with the a D-Link Access Point,
click the Failed Clients page.
Field Description
MAC Address The Ethernet address of the client.
BSSID The managed AP VAP Ethernet MAC address on which the
client attempted to associate and/or authenticate.
SSID The network SSID on which client attempted to associate and/
or authenticate.
Last Failure Type Indicates the last type of failure that occurred, which can be
Authentication or Association.
Age Time since failure occurred.
Click the MAC address of the failed client to view additional information about a client.
NOTE: If a wrong password is entered on a client for WEP, this page may not list that
authentication failed client. This issue actually arises from a known problem
with the IEEE 802.11 specification. The specification says that if the AP is
unable to decode the third frame (containing the encrypted challenge text), it
should send an unsuccessful result. However, if the AP is unable to decode a
WEP frame, it does not know whether that frame is actually the third frame,
or even a Shared Key frame at all, and does not send a result. This issue only
applies to WEP (which is not recommended due to security issues) that uses
Shared Key authentication when the key is incorrect.
The client authentication failure status for an individual client shows information about the
client that failed to authenticate or associate with an AP and list the number of authentication
or association failures. A client with a high number of failed authentications might indicate a
possible threat to the WLAN.
Table 51 shows the fields on the detail page for Client Authentication Failure Status.
Table 51. Client Authentication Failure Status
Field Description
MAC Address The Ethernet address of the client.
BSSID The managed AP VAP Ethernet MAC address on which the
client attempted to associate and/or authenticate.
SSID The network SSID on which client attempted to associate and/
or authenticate.
Last Failure Type Indicates the last type of failure that occurred, which can be
Authentication or Association.
Authentication Failure Count Count of authentication failures for this client.
Association Failure Count Count of association failures for this client.
Age Time since failure occurred.
To delete the ad hoc client entries from the list, click Delete All. The status list is cleared on
the switch.
NOTE: Clearing the list does not disassociate any of the ad hoc clients, and the clients
might still be involved in the ad hoc network.
If you want to block an ad hoc client from WLAN access, select the check box next to the
MAC address of the client and click Deny MAC. The MAC address is added to the MAC
Deny List in the AP Profile MAC Authentication settings. If you select the check box and
click Allow MAC, the MAC address is added to the Allow MAC List in the AP Profile MAC
Authentication settings.
NOTE: The MAC address is added to the local MAC authentication list for all pro-
files where the global default action is set to allow (for Allow MAC), or deny
(for Deny MAC). If you use RADIUS for MAC authentication in one or more
AP profiles, you must add the MAC to the RADIUS database.
Each AP profile has one global MAC authentication list which is either a list to deny access to
all MAC addresses on the list or to allow access to all MAC addresses on the list. To se the
mode for the default AP Profile, click the Administration > Basic Setup > AAA/RADIUS
tab. Set the MAC Authentication Default Action field to Allow or Deny all MAC Addresses in
the list. To set the mode for a different AP profile go to the Global tab on the AP Profile to
configure.
The switch does not remove MAC entries from this list even when a client successfully
authenticates with an AP. The historical ad hoc data gives you more time to take action against
clients that establish ad hoc networks on the WLAN.
Table 52. Ad Hoc Client Status
Field Description
MAC Address The Ethernet address of the client. If the Detection Mode is Beacon then the
client is represented as an AP in the RF Scan database and the Neighbor AP
List. If the Detection Mode is Data Frame then the client information is in the
Neighbor Client List.
AP MAC Address The base Ethernet MAC Address of the managed AP which detected the
client.
Location The configured descriptive location for the managed AP.
Radio The radio interface and its configured mode that detected the ad hoc device.
Detection Mode The mechanism of detecting this Ad Hoc device. The possible values are
Beacon Frame or Data Frame.
Age Time in seconds since last detection of the ad hoc network.
requirements than the users in other buildings. The administrator of this WLAN has created
two AP profiles on the switch in addition to the default profile.
Building 1
AP Profile: Default
Unified Switch
Building 2
AP Profile: Engineering
Building 3
AP Profile: Marketing
Building 1 contains the main lobby and several conference rooms. The WLAN users in this
location are primarily non-employees and guests. The APs in Building 1 uses the default AP
profile with no additional networks and no security.
Building 2 is the engineering building. The Building 2 APs use a profile called “Engineering.”
The Engineering profile has three different VAPs that each have a unique SSID: Hardware,
Software and Test.
Building 3 is the Sales and Marketing building. The Building 3 AP uses a profile called
“Marketing.” The Marketing AP Profile has three VAPs. The SSIDs for the VAPs are: Sales,
Marketing, and Program Management.
If the network administrator adds another AP to Building 2, she assigns the Engineering
profile to the AP during the AP validation process.
After you add the profile, the Global Configuration page for the profile appears, and a new
tab with the name of the profile appears a the top of the page. Click the Radio, VAP, or QoS
tabs to configure additional features for the profile.
Figure 68 shows the layout for AP Profile configuration.
Profiles
Profile Configuration Pages
To copy an existing profile and all of its configurations to a new profile, select the profile with
the configuration to copy, enter a name for the new profile, and click Copy.
Applying an AP Profile
After you update an AP Profile on the Unified Switch, the changes are not applied to the
access points that use that profile until you explicitly apply the profile on the Access Point
Profile Summary page or reset the APs that use the profile.
NOTE: When you change the VLAN ID for a wireless network, the AP might
temporary lose its DHCP-assigned IP address when you apply the updated
profile. If this occurs, the AP goes into Standalone mode. As soon as the AP
regains its IP address from the DHCP server on your network, it resumes
normal operation as a managed AP. You might also see this behavior when
you enable or disable a VAP (SSID) and re-apply the AP profile.
To apply the profile changes to all access points that use a profile, select the profile and click
Apply, as Figure 69 shows.
NOTE: When you apply new AP Profile settings to an AP, the access point stops and
restarts system processes. If this happens, wireless clients will temporarily
lose connectivity. We recommend that you change access point settings when
WLAN traffic is low.
The Profile Status field can have one of the following values:
• Associated—The profile is configured, and one or more APs managed by the switch are
associated with this profile.
• Associated-Modified—The profile has been modified since it was applied to one or more
associated APs; the profile must be re-applied for the changes to take effect.
• Apply Requested—After you select a profile and click Apply, the screen refreshes and
shows that an apply has been requested.
• Apply In Progress—The profile is being applied to all APs that use this profile. During
this process the APs reset, and all wireless clients are disassociated from the AP.
• Configured—The profile is configured, but no APs managed by the switch currently use
this profile.
NOTE: You associate a profile with an AP in the Valid AP database.
Field Description
Peer Group ID In order to support larger networks, you can configure Unified Switches as
peers, with up to 4 switches in a peer group. Peer Unified Switches share
some information about APs and allow L3 roaming among them.
Peer Unified Switches are grouped according to the Group ID.
Client Roam This value determines how long to keep an entry in the Associated Client
Timeout Status list after a client has disassociated. Each entry in the status list shows
an age, and when the age reaches the value you configure in the timeout field,
the entry is deleted.
Ad Hoc Client This value determines how long to keep an entry in the Ad Hoc Client Status
Status list. Each entry in the status list shows an age, and when the age reaches the
value you configure in the timeout field, the entry is deleted.
AP Failure Status This value determines how long to keep an entry in the AP Authentication
Failure Status list. Each entry in the status list shows an age, and when the
age reaches the value you configure in the timeout field, the entry is deleted.
Client Failure This value determines how long to keep an entry in the Client Authentication
Status Failure Status list. Each entry in the status list shows an age, and when the
age reaches the value you configure in the timeout field, the entry is deleted.
RF Scan Status This value determines how long to keep an entry in the RF Scan Status list.
Each entry in the status list shows an age, and when the age reaches the value
you configure in the timeout field, the entry is deleted.
Tunnel IP MTU Sets the maximum size of the IP packet handled by the network. The MTU is
Size enforced only on tunneled VAPs. Select one of the following values:
• 1500: Maps the tunneled IP frame size to 1518 bytes (untagged) and
1522 bytes (tagged). Use this setting if your network does not support
jumbo frames. Using 1500 as the Tunnel IP MTU size forces the D-Link
Unified Access System to limit its maximum message size to 1518/1522
bytes. This setting directs the wireless system to mitigate the problem of
oversized frames by enabling the MTU discovery protocol and limiting
the maximum segment size in TCP connection setup messages.
• 1520: Maps the tunneled IP frame size to 1538 bytes (untagged) and
1542 bytes (tagged). Use this setting if your network supports jumbo
frames and you have configured the physical ports between the switch
and the APs to support 1538/1542 byte packets.
IP Packets that use the L3 tunnel have an extra 20 bytes in the header for
encapsulation. This means that wireless clients configured with a 1500 byte
IP MTU size may exceed the maximum MTU size of the existing network
infrastructure if it is set up to switch and route 1518 (1522-tagged) byte
frames.
Setting the Network MTU Size to 1500 or 1520 does not affect physical port
MTU size. The physical ports on the switch and the rest of the network
devices must be configured with the appropriate MTU size.
NOTE: If the AP is not connected directly to the wireless switch and the
Tunnel IP MTU Size is set to 1520, any Ethernet segments in the path
between the AP and the wireless switch must support jumbo frames and be
configured for jumbo frames.
The AP does not send out any traps. The switch generates all SNMP traps based on its own
events and events it learns about through updates from the APs it manages.
Table 54 describes the events that generate SNMP traps. All traps are disabled by default.
Table 54. SNMP Traps
Field Description
AP Failure Traps If you enable this field, the SNMP agent sends a trap if an AP fails to
associate or authenticate with the switch.
AP State Change If you enable this field, the SNMP agent sends a trap for one of the following
Traps reasons:
• Managed AP Discovered
• Managed AP Failed
• Managed AP Unknown Protocol Discovered
• Managed AP Load Balancing Utilization Exceeded
Client Failure If you enable this field, the SNMP agent sends a trap if a wireless client fails
Traps to associate or authenticate with an AP that is managed by the switch.
Client State If you enable this field, the SNMP agent sends a trap for one of the following
Change Traps reasons associated with the wireless client:
• Client Association Detected
• Client Disassociation Detected
• Client Roam Detected
Field Description
Peer Switch Traps If you enable this field, the SNMP agent sends a trap for one of the following
reasons associated with a peer switch:
• Peer Unified Switch Discovered
• Peer Unified Switch Failed
• Peer Unified Switch Unknown Protocol Discovered
RF Scan Traps If you enable this field, the SNMP agent sends a trap when the RF scan
detects a new AP, wireless client, or ad-hoc client.
Rogue AP Traps If you enable this field, the SNMP agent sends a trap when the switch
discovers a rogue AP.
Wireless Status If you enable this field, the SNMP agent sends a trap if the operational status
Traps of the D-Link Unified Switch changes or of any of the following databases or
lists has reached the maximum number of entries:
• Managed AP database
• AP Neighbor List
• Client Neighbor List
• AP Authentication Failure List
• RF Scan AP List
• Client Association Database
• Client Authentication Failure List
Client If you enable this field, the SNMP agent sends a trap when a wireless client
Authentication authenticates successfully to the network through a captive portal.
Trap
Configuring QoS
Quality of Service (QoS) provides you with the ability to specify parameters on multiple
queues for increased throughput and better performance of differentiated wireless traffic like
Voice-over-IP (VoIP), other types of audio, video, and streaming media as well as traditional
IP data over the D-Link Unified Access System.
For detailed information about QoS and how it is used in the D-Link Unified Access System,
see Appendix D, “Understanding Quality of Service” on page 223.
Configuring QoS on the D-Link Unified Access System consists of setting parameters on
existing queues for different types of wireless traffic, and effectively specifying minimum and
maximum wait times (through Contention Windows) for transmission. The settings described
here apply to data transmission behavior on the access point only, not to that of the client
stations.
AP Enhanced Distributed Channel Access (EDCA) Parameters affect traffic flowing from the
access point to the client station. Station Enhanced Distributed Channel Access (EDCA)
Parameters affect traffic flowing from the client station to the access point.
NOTE: QoS is configured per radio interface.
Field Description
Queue Queues are defined for different types of data transmitted from AP-to-
station:
Data 0 (Voice)
High priority queue, minimum delay. Time-sensitive data such as VoIP
and streaming media are automatically sent to this queue.
Data 1(Video)
High priority queue, minimum delay. Time-sensitive video data is
automatically sent to this queue.
Data 2 (best effort)
Medium priority queue, medium throughput and delay. Most traditional
IP data is sent to this queue.
Data 3 (Background)
Lowest priority queue, high throughput. Bulk data that requires
maximum throughput and is not time-sensitive is sent to this queue
(FTP data, for example).
AIFS The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time (in
(Inter-Frame Space) milliseconds) for data frames.
Valid values for AIFS are 1 through 255.
cwMin This parameter is input to the algorithm that determines the initial
(Minimum Contention random backoff wait time ("window") for retry of a transmission.
Window) The value specified here in the Minimum Contention Window is the
upper limit (in milliseconds) of a range from which the initial random
backoff wait time is determined.
The first random number generated will be a number between 0 and the
number specified here.
If the first random backoff wait time expires before the data frame is
sent, a retry counter is incremented and the random backoff value
(window) is doubled. Doubling will continue until the size of the
random backoff value reaches the number defined in the Maximum
Contention Window.
Valid values for the “cwmin” are 1, 3, 7, 15, 31, 63, 127, 255, 511, or
1023. The value for “cwmin” must be lower than the value for “cwmax”.
cwMax The value specified here in the Maximum Contention Window is the
(Maximum Contention upper limit (in milliseconds) for the doubling of the random backoff
Window) value. This doubling continues until either the data frame is sent or the
Maximum Contention Window size is reached.
Once the Maximum Contention Window size is reached, retries will
continue until a maximum number of retries allowed is reached.
Valid values for the “cwmax” are 1, 3, 7, 15, 31, 63, 127, 255, 511, or
1023. The value for “cwmax” must be higher than the value for
“cwmin”.
Field Description
Max. Burst Length AP EDCA Parameter Only (The Max. Burst Length applies only to
traffic flowing from the access point to the client station.)
This value specifies (in milliseconds) the Maximum Burst Length
allowed for packet bursts on the wireless network. A packet burst is a
collection of multiple frames transmitted without header information.
The decreased overhead results in higher throughput and better
performance.
Valid values for maximum burst length are 0 through 999.
WMM Mode Wi-Fi MultiMedia (WMM) is enabled by default. With WMM
enabled, QoS prioritization and coordination of wireless medium access
is on. With WMM enabled, QoS settings on the D-Link Unified Access
System control downstream traffic flowing from the access point to
client station (AP EDCA parameters) and the upstream traffic flowing
from the station to the access point (station EDCA parameters).
Disabling WMM deactivates QoS control of station EDCA parameters
on upstream traffic flowing from the station to the access point
With WMM disabled, you can still set some parameters on the
downstream traffic flowing from the access point to the client station
(AP EDCA parameters).
To disable WMM extensions, click Disabled.
To enable WMM extensions, click Enabled.
Queue Queues are defined for different types of data transmitted from station-
to-AP:
Data 0 (Voice)
Highest priority queue, minimum delay. Time-sensitive data such as
VoIP and streaming media are automatically sent to this queue.
Data 1(Video)
Highest priority queue, minimum delay. Time-sensitive video data is
automatically sent to this queue.
Data 2 (best effort)
Medium priority queue, medium throughput and delay. Most traditional
IP data is sent to this queue.
Data 3 (Background)
Lowest priority queue, high throughput. Bulk data that requires
maximum throughput and is not time-sensitive is sent to this queue
(FTP data, for example).
AIFS The Arbitration Inter-Frame Spacing (AIFS) specifies a wait time (in
(Inter-Frame Space) milliseconds) for data frames.
Valid values for AIFS are 1 through 255.
Field Description
cwMin This parameter is input to the algorithm that determines the initial
(Minimum Contention random backoff wait time ("window") for retry of a transmission.
Window) The value specified in the Minimum Contention Window is the upper
limit (in milliseconds) of a range from which the initial random backoff
wait time is determined.
The first random number generated will be a number between 0 and the
number specified here.
If the first random backoff wait time expires before the data frame is
sent, a retry counter is incremented and the random backoff value
(window) is doubled. Doubling will continue until the size of the
random backoff value reaches the number defined in the Maximum
Contention Window.
Valid values for cwMin are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1023.
The value for cwMin can be equal to or lower than the value for cwMax.
cwMax The value specified in the Maximum Contention Window is the upper
(Maximum Contention limit (in milliseconds) for the doubling of the random backoff value.
Window) This doubling continues until either the data frame is sent or the
Maximum Contention Window size is reached.
Once the Maximum Contention Window size is reached, retries will
continue until a maximum number of retries allowed is reached.
Valid values for cwMax are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1023.
The value for cwMax can be equal to or higher than the value for
cwMin.
TXOP Limit Station EDCA Parameter Only (The TXOP Limit applies only to
traffic flowing from the client station to the access point.)
The Transmission Opportunity (TXOP) is an interval of time when a
WME client station has the right to initiate transmissions onto the
wireless medium (WM).
This value specifies (in milliseconds) the Transmission Opportunity
(TXOP) for client stations; that is, the interval of time when a WMM
client station has the right to initiate transmissions on the wireless
network.
The TXOP Limit range is 0 to 65535. The value is in units of 32-
microsecond periods.
Field Description
Enable Captive Select the check box to enable the CP feature on the switch. Clear the check
Portal box to disable the captive portal feature.
CP Global Shows whether the CP feature is enabled.
Operational Status
CP Global Disable If CP is disabled, this field displays the reason, which can be one of the
Reason following:
• None
• Administratively Disabled
• No IPv4 Address
• Routing Enabled, But no IPv4 routing interface
Additional HTTP HTTP traffic uses port 80, but you can configure an additional port for HTTP
Port traffic. Enter a port number between 0-65535 (excluding port 80).
Peer Switch When the D-Link Unified Switch is associated with peer switches, the peers
Statistics can send information about their captive portals. The value you enter
Reporting Interval controls how often the switch sends its captive portal statistics to peer
switches. The interval is in seconds.
Authentication To access the network through a portal, the wireless client must first enter
Timeout authentication information on an authentication Web page. Enter the number
of seconds to keep the authentication session open with the client. When the
timeout expires, the switch disconnects any active TCP or SSL connection
with the client.
To view summary information about existing captive portals, or to add or delete a captive
portal, click Security > Captive Portal > CP Configuration.
To create a CP configuration, enter the configuration name in the text box and click Add.
After you add the configuration, the CP Configuration page for that configuration displays,
and a new tab with the name of that configuration appears.
To delete an existing CP, select the check box for the CP to remove, and then click Delete.
To configure the settings for an existing CP, click the name in the Configuration column or
click the appropriate tab.
Table 57 describes the fields on the CP Summary page.
Field Description
Configuration Shows the captive portal ID and name. To access the configuration page for
an exiting CP, click the configuration name.
Mode Shows whether the CP is enabled.
Protocol Indicates whether the portal uses HTTP or HTTPS.
Verification Specifies which type of user verification to perform:
• Guest: The user does not need to be authenticated by a database.
• Local: The switch uses a local database to authenticated users.
• RADIUS: The switch uses a database on a remote RADIUS server to
authenticate users.
To configure authorized users on the local or remote RADIUS database, see
“Monitoring and Configuring Captive Portal Users” on page 168.
Field Description
Enable Captive Select the check box to enable the CP. Clear the check box to disable it.
Portal
Configuration This field allows you to change the name of the portal added from the CP
Name Summary page.
Protocol Mode Choose whether to use HTTP or HTTPs as the protocol for the portal to use
during the verification process.
• HTTP: Does not use encryption during verification
• HTTPS: Uses the Secure Sockets Layer (SSL), which requires a
certificate to provide encryption. The certificate is presented to the user
at connection time.
Verification Mode Select the mode for the CP to use to verify clients:
• Guest: The user does not need to be authenticated by a database.
• Local: The switch uses a local database to authenticated users.
• RADIUS: The switch uses a database on a remote RADIUS server to
authenticate users.
URL Redirect Select the check box to specify that the CP should redirect the newly
Mode authenticated client to the configured URL. If the check box is clear, the user
sees the locale-specific welcome page after a successful verification.
Redirect URL Specify the URL to which the newly authenticated client is redirected if the
URL Redirect Mode is enabled.
Session Timeout Enter the number of seconds to wait before terminating a session. A user is
logged out once the session timeout is reached. If the value is set to 0 then the
timeout is not enforced. The default value is 0.
Idle Timeout Enter the number of seconds a user can remain idle before automatically
being logged out. If the value is set to 0 then the timeout is not enforced.The
default value is 0.
Field Description
User Group If the Verification Mode is Local, assign an existing User Group to the
captive portal or create a new group. All users who belong to the group are
permitted to access the network through this portal. The User Group list is
the same for all CP configurations on the switch.
The User Group field also allows you to add, delete, or rename user groups
for all captive portals.
• To assign an existing user group to the CP, select it from the drop-down
menu.
• To create a new user group, enter the group name in the blank field and
click Add.
• To change the name of an existing user group, select the name to change
from the drop-down menu, enter the new name in the blank field, and
click Modify.
• To delete a user group, select it from the drop-down menu and click
Delete.
Note: The User Group fields are unavailable if the Verification Mode is
Guest or RADIUS.
Acceptance Use Enter the Acceptance Use Policy to display when users access the CP. The
Policy policy can contain up to 8192 text characters.
Any users that are already configured are listed on the Local User Summary page.
Field Description
User Identifies the name of the user.
Group Identifies the group to which the user belongs. Each captive portal has a user
group assigned to it. Only users in the group can access the captive portal.
Each user can be in one or more groups.
Session Timeout Shows the number of seconds a user is permitted to remain connected to the
network. Once the Session Timeout value is reached, the user is logged out
automatically. A value of 0 means that the user does not have a Session
Timeout limit.
Idle Timeout Shows the number of seconds the user can remain idle before the switch
automatically logs the user out. A value of 0 means that the user will not be
logged out automatically.
To access the configuration page for a specific user listed on the page, click the user name. To
add a new user and configure the Local User settings, click Add. To delete a user from the
local database, select the check box next to the user to remove and click Delete. Select
multiple check boxes to delete more than one user at a time. Click Delete All to remove all
configured users from the local database.
Table 60 describes the fields you use to configure CP users in the local database.
Field Description
User Name Enter the name of the user.
Password Enter a password for the user. The password length can be from 8 to 64
characters.
User Group Assign the user to at least one User Group. To assign a user to more than one
group, press the Ctrl key and click each group.
New users are assigned to the 1-Default user group by default.
Session Timeout Enter the number of seconds a user is permitted to remain connected to the
network. Once the Session Timeout value is reached, the user is logged out
automatically. A value of 0 means that the user does not have a Session
Timeout limit.
Idle Timeout Enter the number of seconds the user can remain idle before the switch
automatically logs the user out. A value of 0 means that the user does not
have an idle timeout limit.
Field Description
CP Configuration Lists the captive portals configured on the switch by number and name.
Associated Lists the wireless interfaces that are currently associated with the selected
Interfaces captive portal. The interface is identified by its wireless network number and
SSID
Interface List Lists the wireless interfaces available on the switch that are not currently
associated with a CP. Each interface is identified by its wireless network
number and SSID.
Use the following steps to associate one or more interfaces with a captive portal.
Field Description
CP Global Shows whether the CP feature is enabled.
Operational Status
CP Global Disable Indicates the reason for the CP to be disabled, which can be one of the
Reason following:
• None
• Administratively Disabled
• No IPv4 Address
• Routing Enabled, But no IPv4 routing interface
CP IP Address Shows the captive portal IP address
Authenticated Shows the number of users currently authenticated to all captive portal
Users instances on this switch.
System Supported Shows the number of authenticated users that the system can support.
Users
Configured Shows the number of captive portals configured on the switch.
Captive Portals
Supported Captive Shows the number of supported captive portals in the system.
Portals
Active Captive Shows the number of captive portal instances that are operationally enabled.
Portals
The CP Activation and Activity Status page has a drop-down menu that contains all captive
portals configured on the switch. When you select a captive portal, the activation and activity
status for that portal displays.
Table 64 describes the information that displays for each portal.
Field Description
Operational Status Indicates whether the captive portal is enabled or disabled.
Disable Reason If the captive portal is disabled, then this field indicates the reason. The
portal instance may be disabled for the following reasons:
• None - CP is enabled.
• Administratively Disabled
• RADIUS Authentication mode enabled, but RADIUS server is not
defined.
• Not associated with any interfaces.
• The associated interfaces do not exist or do not support the CP
capability.
Blocked Status Indicates whether authentication attempts to the captive portal are currently
blocked.
Use the Block and Unblock buttons to control the blocked status. If the CP is
blocked, users cannot gain access to the network through the CP. Use this
function to temporarily protect the network during unexpected events, such
as denial of service attacks.
Block and Unblock are only available when the CP operational status is
Enabled.
Authenticated Shows the number of users that successfully authenticated to this captive
Users portal and are currently using the portal.
The following buttons are available on the CP Activation and Activity page:
• Block—Click Block to prevent users from gaining access to the network through the
selected captive portal.
• Unblock—If the Blocked Status of the selected captive portal is Blocked, click Unblock
to allow access to the network through the captive portal.
• Refresh—Click Refresh to update the screen with the most current information.
Field Description
Operational Status Shows whether the portal is active on the specified interface.
Disable Reason If the selected CP is disabled on this interface, this field indicates the reason,
which can be one of the following:
• Interface Not Attached
• Disabled by Administrator
Blocked Status Indicates whether the captive portal is temporarily blocked for
authentications.
Authenticated Displays the number of authenticated users using the captive portal instance
Users on this interface.
The drop-down menu contains all the wireless interfaces available on the switch. Each
interface is identified by its wireless network number and SSID. Use the drop-down menu to
select the interface with the information to display.
Table 66 describes the fields on the Interface Capability Status page.
Parameter Description
Session Timeout Shows whether the interface supports client session timeout. This attribute is
supported on all interfaces.
Bytes Received Shows whether the interface supports displaying the number of bytes
Counter received from each client.
Bytes Transmitted Shows whether the interface supports displaying the number of bytes trans-
Counter mitted to each client.
Roaming Support Shows whether the interface supports client roaming. Only wireless inter-
faces support client roaming.
Idle Timeout Shows whether the interface supports a timeout when the user doesn't send or
receive any traffic.
Packets Received Shows whether the interface supports displaying the number of packets
Counter received from each client.
Packets Shows whether the interface supports displaying the number of packets
Transmitted transmitted to each client.
Counter
Field Description
Client MAC Identifies the MAC address of the wireless client (if applicable).
Address
Client IP Address Identifies the IP address of the wireless client (if applicable).
User Displays the user name (or Guest ID) of the connected client.
Protocol Shows the current connection protocol, which is either HTTP or HTTPS.
Verification Shows the current account type, which is Guest, Local, or RADIUS.
To force the captive portal to disconnect an authenticated client, select the check box next to
the client MAC address and click Delete. To disconnect all clients from all captive portals,
click Delete All.
Click the MAC address of a client to view additional status information.
The drop-down menu lists each associated client by MAC address. To view status information
for a client, select it from the list.
Table 68 describes the fields on the Client Detail page.
Field Description
User Name Displays the user name (or Guest ID) of the connected client.
CP Configuration Identifies the CP configuration the wireless client is using.
Protocol Shows the current connection protocol, which is either HTTP or HTTPS.
Client IP Address Identifies the IP address of the wireless client (if applicable).
Session Time Shows the amount of time that has passed since the client was authorized.
Verification Shows the current account type, which is Guest, Local, or RADIUS.
Interface Identifies the interface the wireless client is using.
The drop-down menu lists each associated client by MAC address. To view statistical
information for a client, select it from the list.
Table 69 describes the fields on the Client Statistics page.
Field Description
Bytes Transmitted Total bytes the client has transmitted
Bytes Received Total bytes the client has received
Packets Transmitted Total packets the client has transmitted
Packets Received Total packets the client has received
The drop-down menu lists each interface on the switch. To view information about the clients
connected to a CP on this interface, select it from the list.
Table 70 describes the fields on the Interface - Client Status page.
Field Description
Client MAC Address Identifies the MAC address of the wireless client
Client IP Address Identifies the IP address of the wireless client
CP Configuration Identifies the captive portal the client used to access the network
Protocol Shows the current connection protocol, which is either HTTP or
HTTPS
Verification Shows the current account type, which is Guest, Local, or RADIUS.
The drop-down menu lists each CP configured on the switch. To view information about the
clients connected to the CP, select it from the list.
Table 71 describes the fields on the Client CP Association Status page.
Field Description
Client MAC Address Identifies the MAC address of the wireless client
Client IP Address Identifies the IP address of the wireless client
Interface Identifies the interface the client used to access the network
Protocol Shows the current connection protocol, which is either HTTP or HTTPS
Verification Shows the current account type, which is Guest, Local, or RADIUS.
Table 72 describes the events that generate SNMP traps when the status is Enabled.
Field Description
Captive Portal Trap Choose one of the following captive portal trap modes:
Mode • Select Enable to allow the SNMP agent on the switch to generate
captive portal SNMP traps that are enabled.
• Select Disable to prevent the SNMP agent on the switch from
generating any captive portal SNMP traps, even if they are
individually enabled.
Client Authentication If you enable this field, the SNMP agent sends a trap when a client
Failure Traps attempts to authenticate with a captive portal but is unsuccessful.
Client Connection If you enable this field, the SNMP agent sends a trap when a client
Traps authenticates with and connects to a captive portal.
Client Database Full If you enable this field, the SNMP agent sends a trap each time an entry
Traps cannot be added to the client database because it is full.
Client Disconnection If you enable this field, the SNMP agent sends a trap when a client
Traps disconnects from a captive portal.
183
D-Link Unified Access System User Manual
Figure 89 shows an example of a floor plan with a D-Link Unified Switch that manages two
APs. The figure also shows two switches and a rogue AP.
Once you upload an image file and save the running configuration, the image remains on the
switch and you can assign it to an existing graph using the WLAN Visualization application.
1. From the WLAN Visualization menu bar, click Edit > New Graph.
The New Graph Definition dialogue box opens.
2. Enter a name to identify the graph and select the image to use as the background.
For information about how to upload an image to use as a graph background, see
3. Enter the represented length for one of the graph dimensions (height or width).
Use the Selection and Measurement drop-down menus to specify whether the length is the
height or width, and whether it is in meters or feet.
The length you enter determines the scale of the background image in relation to the
network components. The scale of the background image affects the way the WLAN
Visualization tool presents the radio frequency (RF) coverage of the access points, so it is
important to be as accurate as possible when you specify the length.
For example, in the following graphs, the background image is the same, and the APs are
in the same location in both images. The only difference between the images is that one
image was set up with a graph definition length of 200 feet, and the other image was set up
Graph Definition
Length = 200’
Graph Definition
Length = 800’
You can create multiple graphs. For example, if your network spans multiple floors or
buildings, you might have a graph for each area. Additional graphs that you create appear as
tabs at the top of the graph panel, as Figure 90 shows.
Wireless clients do not appear in the panel. Instead, they are automatically graphed based on
their association with (or disassociation from) a D-Link Access Point that is graphed.
If you mouse-over an ungraphed component, a tool tip appears to provide additional
information about the ungraphed component, as shown in Figure 92l
To graph a component that is listed in the panel, click the component and drag it to the location
in the graph that represents the physical location of the component in the building. Once you
move a switch or access point to the graph area, it is removed from the panel.
Hold the SHIFT or CTRL key to select multiple components, then right-click a selected
component to drag the components onto the graph at the same time.
To remove a component from the graph, right-click the component, the select Edit >
Un-Graph.
Legend Menu
The items in the Legend menu contain information about the icons and colors that appear on
the graph.
The Images menu item shows the icons that represent the WLAN components on the graph.
As the legend shows, the Managed AP icon can be blue, green, or red, depending on the status
of the AP:
• Blue—The AP has been discovered and by the switch, but it is in a transitional state. The
AP could be waiting to be authenticated, or it has been validated and authenticated but not
configured.
• Green—The AP profile configuration has been applied to the AP, and it is operating in
managed mode.
• Red—The switch has lost contact with the AP, the AP is being reset, or the AP has
experienced an authentication failure.
When a radio is operating in Sentry Mode, the antenna on the AP icon is replaced by the letter
“S” as Figure 95 shows.
For radios in sentry mode, the AP power display image around the AP is gray.
The Channel Color legend maps the color of the power display image to the channel that the
image color represents. The color corresponds to the channel that the radio is using for
transmission. The available channels depend on the mode and country of operation.
To view the channel that a radio is using, you can mouse-over the managed AP to activate the
tool tip. The tool tip displays general information about the AP, including the channel that each
radio uses.
You can also right-click the object to access a variety of information, which the next section
describes.
Table 74 lists the attribute and link information available from each component.
Table 74. Component Information
Feature Default
System Information
User Name admin
Password None
Network Information
DHCP Client Disabled
Network Configuration Protocol None
IP Address 10.90.90.90
Subnet Mask 255.0.0.0
802.1Q Enabled
Management VLAN ID 1
Untagged VLAN ID 1
Spanning Tree Protocol Enabled
Feature Default
WLAN Information
Unified Switch Mode Enabled
AP Authentication Disabled
AP Validation Local
Country Code US
Default Profile Name Default
Peer Switch Group ID 1
L2 (VLAN) /L3 (IP) Discovery Enabled
SNMP Traps Disabled
Client Roam Timeout 30 seconds
Ad Hoc Client Status 24 hours
AP Failure Status 24 hours
Client Failure Status 24 hours
RF Scan Status 24 hours
Feature Default
System Information
User Name admin
Password admin
Network Information
DHCP Client Enabled
Management IP Address 10.90.90.91 (If not assigned by DHCP)
Subnet Mask 255.0.0.0 (If not assigned by DHCP)
Management VLAN 1
Untagged VLAN 1
Feature Default
Radio Settings
Radio (1 and 2) On
Radio 1 IEEE 802.11 Mode 802.11a
NOTE: If the AP operates in a regulatory domain
where 802.11a is not supported, the radio is disabled
and no mode is configured.
Radio 2 IEEE 802.11 Mode 802.11b/g
RF Scan Other Channels Disabled
RF Scan Interval 60 seconds
RF Scan Duration 10 milliseconds
Super A/G Disabled
Extended Range Disabled
Automatic Channel Enabled
Automatic Power Enabled
Initial Power 100
Load Balancing Disabled
Load Utilization 60%
Maximum Clients 256
RTS Threshold 2347 bytes
DTIM Period 10 beacons
Fragmentation Threshold 2346 bytes
Beacon Period 100 milliseconds
Rate Sets IEEE 802.1a: 54, 48, 36, 24, 18, 12, 9, 6
Supported (Mbps) IEEE 802.1g: 54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, 1
IEEE 802.1b: 11, 5.5, 2, 1
Atheros Dynamic Turbo 5 GHz: 108, 96, 72, 48, 36, 24,
18, 12
Rate Sets (Mbps) IEEE 802.1a: 24, 12, 6
(Basic/Advertised) IEEE 802.1g: 11, 5.5, 2, 1
IEEE 802.1b: 2, 1
Atheros Dynamic Turbo 5 GHz: 48, 24, 12
Feature Default
Virtual Access Point and Network Settings
Status VAP0 is enabled on both radios, all other VAPs
disabled
Network Name (SSID) Guest Network (VAP0)
VLAN 1
Hide SSID Disabled
L3 Tunnel Disabled
Security Mode Open System
MAC Authentication Disabled
RADIUS IP Address Use Profile (Global)
RADIUS Accounting Disabled
Other Settings
QoS Enabled
WMM Enabled
Feature Default
Global Configuration
Operational Status Enabled
Additional HTTP Port None
Peer Switch Statistics Reporting 120 seconds
Interval
Authentication Session Timeout 600 seconds
CP Configuration
Status Enabled
Configuration Name None
Protocol Mode HTTP
Verification Mode Guest
User Group None
URL Redirect Mode Disabled
Session Timeout 0 (unlimited)
Idle Timeout 0 (unlimited)
Languages English
RADIUS Server
Description Range Usage
Attribute
User-Name (1) Ethernet Address of the AP. Valid Ethernet MAC Required
Address
User-Password (2) A fixed password used to 8-63 characters, default Required
lookup an AP entry. NOPASSWORD
Vendor-Specific (26) A description for the AP, 1-32 characters Optional
Location often based on its location.
RADIUS Server
Description Range Usage
Attribute
Vendor-Specific (26) Indicates whether this AP is WS Managed (1) Required
Mode managed by the switch, by an Standalone (2)
administrator, or is a rogue
AP. Acknowledged Rogue
(3)
Vendor-Specific (26) If AP is managed by a switch, 1-16 Required if
Profile-ID the ID of the configuration mode is WS
profile for this AP. managed.
Vendor-Specific (26) If there is more than one WS Valid IP Address Optional
Switch-IP using this RADIUS server,
indicates the IP address of the
WS to managed this AP.
Vendor-Specific (26) Indicates a fixed channel for Valid channels depend Optional, if
Radio-1-Chan the radio. on the regulatory defined and
Vendor-Specific (26) domain (country-code) valid will
Radio-2-Chan and the configured override auto
mode for that radio in channel
the assigned AP profile. configuration
If the channel is not
valid, its ignored.
0 indicates automatic
channel assignment.
Vendor-Specific (26) Indicates a fixed power 0, 1-100 percent Optional, if
Radio-1-Power setting for the radio. 0 indicates automatic defined and
power assignment. valid will
override auto
power
configuration
Vendor-Specific (26) Indicates a fixed power 0, 1-100 percent Optional, if
Radio-2-Power setting for the radio. 0 indicates automatic defined and
power assignment. valid will
override auto
power
configuration
When you do not require authentication between the APs and the RADIUS server, the switch
uses the password “NOPASSWORD” in communications between the RADIUS client on the
switch and the RADIUS server. The RADIUS client on the switch uses this password when it
retrieves entries from the server. When you do require AP authentication, the password for AP
authentication to the Unified Switch (separate from and in addition to AP authentication to the
network) will be in this field.
NOTE: In the FreeRADIUS database, the MAC address is case sensitive, and the
octets must be separated by hyphens.
00-11-95-a3-32-80 Auth-Type := Local, User-Password=="NOPASSWORD"
D-Link-Wireless-AP-Mode = WS-Managed,
D-Link-Wireless-AP-Location = "Lobby AP",
D-Link-Wireless-AP-Profile-ID = 1,
D-Link-Wireless-AP-Switch-IP = 192.168.30.4,
D-Link-Wireless-AP-Radio-1-Chan = Auto,
D-Link-Wireless-AP-Radio-2-Chan = Auto,
D-Link-Wireless-AP-Radio-1-Power = Auto,
D-Link-Wireless-AP-Radio-2-Power = Auto
RADIUS Server
Description Range Usage
Attribute
User-Name (1) 1-32 characters Required
User-Password (2) 1-128 characters Required
Tunnel-Medium-Type 802 Optional
(65)
RADIUS Server
Description Range Usage
Attribute
User-Name (1) Ethernet Address of the client Valid Ethernet Required
station. MAC Address.
User-Password (2) A fixed password used to NOPASSWORD Required
lookup a client MAC entry.
The following example shows the entry for a user in the users file. The username is
“johndoe,” the password is “test1234.” The user is assigned to VLAN 77.
johndoe Auth-Type: = EAP, User-Password == “test1234"
Tunnel-Type = 13,
Tunnel-Medium-Type = 6,
Tunnel-Private-Group-ID = 77
Tunnel-Type and Tunnel-Medium-Type use the same values for all stations. Tunnel-Private-
Group-ID is the selected VLAN ID and can be different for each user.
NOTE: Do not use the management VLAN ID of the AP for the value of the Tunnel-
Private-Group-ID.
The dynamically-assigned RADIUS VLAN cannot be the same as the AP’s management
VLAN. If the RADIUS server attempts to assign a dynamic VLAN to a client that associates
with an AP with that VLAN as the management VLAN, the AP ignores the dynamic VLAN
assignment and a newly associated client is assigned to the default VLAN for that VAP. A re-
authenticating client retains its previous VLAN ID.
The default management VLAN ID for all APs is 1. The only way to change an AP’s
management VLAN ID is by using the set management vlan-id command from the CLI.
After you change the etc/raddb/users file, you must restart the RADIUS server daemon to
apply the changes.
WS1 Network
Interface WS2 Network WS2 VLAN Routing Interface
192.168.2.20 Interface WS2 192.168.60.25
Call Server
192.168.7.20
192.168.60.35
WS2 WLAN (Loopback)
Interface
192.168.200.15
L3 Network
AP1
192.168.18.10 AP2
192.168.28.10
2. Enable routing.
(System-Prompt) (Config)#ip routing
3. Change to Interface Config mode for loopback interface 0, and assign an IP address and
subnet mask.
(System-Prompt) (Config)#interface loopback 0
(System-Prompt) (Interface loopback 0)#ip address 192.168.100.15 255.255.255.255
You can also use the Web interface or SNMP to enable routing and configure an IP address.
The following example shows the procedures to enable routing and configure an IP address on
the switch by using the Web interface.
1. Log on to the Web interface and click Routing > IP > Configuration to access the IP
Configuration page.
2. From the Routing Mode drop-down menu, choose Enable, and then click Submit.
3. To create a loopback interface, click Routing > Loopback > Configuration.
4. From the Loopback drop-down menu, choose Create, and then click Submit
5. Enter an IPv4 address and subnet mask in the appropriate fields, and then click Submit.
3. Exit to Privileged EXEC mode and view the VLAN routing interface configuration.
(switch-prompt) (Vlan)#exit
(switch-prompt) #show ip vlan
Logical
VLAN ID Interface IP Address Subnet Mask
------- -------------- --------------- ---------------
200 0/4/1 0.0.0.0 0.0.0.0
The new VLAN routing interface is 0/4/1 in unit/slot/port format. For non-stacking
platforms, the interface would be 4/1.
4. Enter the interface configuration mode for the new VLAN routing interface.
(switch-prompt) #configure
(switch-prompt) (Config)#interface 0/4/1
6. Add the port to which the call server is attached to VLAN 200 (in this example, the call
server is attached to port 3).
(switch-prompt) (Config)#interface 1/0/3
(switch-prompt) (Interface 1/0/3)#vlan participation include 200
To perform the same steps by using the Web interface, use the following procedures:
1. From the L2 Features > VLAN > Configuration page, create a VLAN, give it a name,
and add the port to which the call server is attached to VLAN 200 (in this example, the call
server is attached to port 3).
2. From the L3 Features > VLAN Routing Configuration page, create a VLAN routing
interface on VLAN 200.
3. From the L3 Features > IP > Interface Configuration page, assign an IP address and
subnet mask to the interface, and make sure routing is enabled.
4. From the Monitoring > L3 Status > VLAN Routing Summary page, view the summary
information for the VLAN routing interface.
4. Enable L3 roaming.
(switch-prompt) (Config-network)#tunnel
5. Configure the L3 network IP address and subnet mask for the tunnel.
NOTE:The network address you enter must be the same subnet used by the VLAN
routing interface created in “Creating the VLAN Routing Interface” on
page 212.
(switch-prompt) (Config-network)#tunnel subnet 192.168.60.0 mask
255.255.255.0
6. Exit out of Network mode and Enter AP profile configuration mode for the default profile
(Profile 1).
(switch-prompt) (Config-network)#exit
(switch-prompt) (Config-wireless)#ap profile 1
7. Enter the AP Profile Radio Config mode for the radio you want to use.
In this example, the L3 Tunnel network uses Radio 1, which is the 802.11g radio by
default.
(switch-prompt) (Config-ap-profile)#radio 1
8. Enter the AP Profile VAP Config mode for VAP 2 and enable the VAP.
VAP 0 is the default network and is the only network enabled by default. In this example,
the Guest networks is on VAP 0, the Corporate Network is on VAP 1, and the L3 Tunnel
Network is on VAP 2.
(switch-prompt) (Config-ap-radio)#vap 2
(switch-prompt) (Config-ap-profile-vap)#enable
10. Enter CTRL + Z to exit to Privileged EXEC mode and view the network configuration to
make sure the L3 Tunnel Status is listed as “Configured” and to confirm that other
network settings are correct.
(switch-prompt) #show wireless network 3
Network ID..................................... 3
SSID........................................... L3 Tunnel
Default VLAN................................... 1
Hide SSID...................................... Disable
Deny Broadcast................................. Disable
L3 Tunnel Mode................................. Enable
L3 Tunnel Status............................... Configured
L3 Tunnel Subnet IP............................ 192.168.60.0
L3 Tunnel Subnet Mask.......................... 255.255.255.0
Security Mode.................................. WPA Enterprise
MAC Authentication............................. Disable
RADIUS Use AP Profile.......................... Enable
RADIUS Server IP............................... 0.0.0.0
RADIUS Secret Configured....................... No
RADIUS Accounting.............................. Disable
WPA Versions................................... WPA/WPA2
WPA Ciphers.................................... TKIP
WPA Key Type................................... ASCII
WPA Key........................................
WPA2 Pre-Authentication........................ Enable
WPA2 Pre-Authentication Limit (minutes)........ 0
WPA2 Pre-Authentication Timeout (minutes)...... 0
--More-- or (q)uit
WPA2 Key Forwarding............................ Enable
WPA2 Key Caching Holdtime (minutes)............ 10
WEP Authentication Type........................ Open System
WEP Key Type................................... HEX
WEP Key Length (bits).......................... 128
WEP Transfer Key Index......................... 1
WEP Key 1......................................
WEP Key 2......................................
WEP Key 3......................................
WEP Key 4......................................
An important value to note is the L3 Tunnel Status value. The following table lists the
possible values and explains what they mean.
Table 82. L3 Tunnel Status Values
After the managed AP updates complete, the L3 Tunnel network is available on all APs that
use the default profile. Users who connect to an AP by using the L3 Tunnel SSID can roam
among all APs without traffic interruption.
To test connectivity, make sure you can ping from each AP to the switch loopback IP address
and the IP address used by the routing interface for L3 tunnels. From Privileged EXEC mode,
you can enable debugging on the AP with the wireless ap debug <macaddr> command,
which allows you to Telnet to the AP.
Once a wireless client associates with the tunneled subnet, use the ping command and set a
large packet size to make sure you can send the desired MTU size through the tunnel.
From a Windows client, use -l <size> to set the packet size and -f to prohibit packet
fragmentation, for example:
ping -l 1542 -f 192.168.60.15
From a Unix system, use -s <size> to set the packet size and -M do to prohibit packet
fragmentation, for example:
ping -s 1542 -M do 192.168.60.15
1. From the Administration > Basic Setup > SSID tab, select the check box next to the
SSID to configure and click Edit.
4. Check the L3 Tunnel Status to make sure the L3 Tunnel Status is Configured.
5. To apply the profile changes to the APs, click Administration > Advanced
Configuration > AP Profiles.
6. Select the Default profile check box and click Apply.
When you update the profile, the Unified Switch adds the L3 Tunnel network to the Managed
APs that use the default profile.
To configure BootP and DHCP relay from the Web interface on the switch, go to the
L3 Features > BootP/DHCP Relay Agent > Configuration page. Configure the server IP
address and enable the Admin Mode, then click Submit.
4. Configure the L3 Tunnel subnet and netmask as the network address for the clients on
VLAN 200.
(switch-prompt) (Config)network 192.168.60.0 255.255.255.0
Use the following procedures to perform the same configuration by using the Web interface.
1. From the Administration > DHCP Server > Global Configuration page, enable the
Admin Mode and enter the range of IP addresses that you do not want to assign to wireless
clients, then click Submit.
2. Navigate to the Administration > DHCP Server > Pool Configuration page and select
Create from the Pool Name drop-down menu.
3. Enter a name for the address pool in the Pool Name field and select Dynamic from the
Type of Binding drop-down menu.
4. Enter a network number, network mask, and default router address in the appropriate
fields and click Submit.
The D-Link Access Points provide QoS based on the Wireless Multimedia (WMM)
specification, which implements a subset of 802.11e features.
Both access points and wireless clients (laptops, consumer electronics products) can be
WMM-enabled by the Wi-Fi Alliance.
• Data 3 (Background). Lowest priority queue, high throughput. Bulk data that requires
maximum throughput and is not time-sensitive is sent to this queue (FTP data, for
example).
Using the QoS settings in the AP profile, you can configure Enhanced Distributed Channel
Access (EDCA) parameters that determine how each queue is treated when it is sent by the
access point to the client or by the client to the access point.
Wireless traffic travels:
• Downstream from the access point to the client station
• Upstream from client station to access point
• Upstream from access point to network
• Downstream from network to access point
With WMM enabled, QoS settings on the D-Link Unified Access System affect the first two of
these; downstream traffic flowing from the access point to client station (AP EDCA
parameters) and the upstream traffic flowing from the station to the access point (station
EDCA parameters).
With WMM disabled, you can still set some parameters on the downstream traffic flowing
from the access point to the client station (AP EDCA parameters).
The other phases of the traffic flow (to and from the network) are not under control of the QoS
settings on the AP.
data frames. Data frames wait for an amount of time defined as the arbitration interframe
space (AIFS) before transmitting.
This parameter is configurable.
The random backoff used by the access point is a configurable parameter. To describe the
random delay, a “Minimum Contention Window” (MinCW) and a “Maximum Contention
Window” (MaxCW) is defined.
• The value specified for the Minimum Contention Window is the upper limit of a range for
the initial random backoff wait time. The number used in the random backoff is initially a
random number between 0 and the number defined for the Minimum Contention Window.
• If the first random backoff time ends before successful transmission of the data frame, the
access point increments a retry counter, and doubles the value of the random backoff
window. The value specified in the Maximum Contention Window is the upper limit for
this doubling of the random backoff. This doubling continues until either the data frame is
sent or the Maximum Contention Window size is reached.
Figure 100 outlines the way in which tags are retrieved and traffic prioritized on a network.
START
Is VLAN tag?
NO YES
YES
NO
Is priority tag = 0
Take priority from tag
YES
NO
229
D-Link Unified Access System User Manual
Limited Software Warranty: D-Link warrants that the software portion of the product
(“Software”) will substantially conform to D-Link’s then current functional specifications for
the Software, as set forth in the applicable documentation, from the date of original retail
purchase of the Software for a period of ninety (90) days (“Software Warranty Period”),
provided that the Software is properly installed on approved hardware and operated as
contemplated in its documentation. D-Link further warrants that, during the Software
Warranty Period, the magnetic media on which D-Link delivers the Software will be free of
physical defects. The customer's sole and exclusive remedy and the entire liability of D-Link
and its suppliers under this Limited Warranty will be, at D-Link’s option, to replace the non-
conforming Software (or defective media) with software that substantially conforms to D-
Link’s functional specifications for the Software or to refund the portion of the actual purchase
price paid that is attributable to the Software. Except as otherwise agreed by D-Link in
writing, the replacement Software is provided only to the original licensee, and is subject to
the terms and conditions of the license granted by D-Link for the Software. Replacement
Software will be warranted for the remainder of the original Warranty Period and is subject to
the same limitations and exclusions. If a material non-conformance is incapable of correction,
or if D-Link determines in its sole discretion that it is not practical to replace the non-
conforming Software, the price paid by the original licensee for the non-conforming Software
will be refunded by D-Link; provided that the non-conforming Software (and all copies
thereof) is first returned to D-Link. The license granted respecting any Software for which a
refund is given automatically terminates.
Non-Applicability of Warranty: The Limited Warranty provided hereunder for Hardware
and Software portions of D-Link's products will not be applied to and does not cover any
refurbished product and any product purchased through the inventory clearance or liquidation
sale or other sales in which D-Link, the sellers, or the liquidators expressly disclaim their
warranty obligation pertaining to the product and in that case, the product is being sold “As-Is”
without any warranty whatsoever including, without limitation, the Limited Warranty as
described herein, notwithstanding anything stated herein to the contrary.
Submitting A Claim: The customer shall return the product to the original purchase point
based on its return policy. In case the return policy period has expired and the product is within
warranty, the customer shall submit a claim to D-Link as outlined below:
• The customer must submit with the product as part of the claim a written description of the
Hardware defect or Software nonconformance in sufficient detail to allow D-Link to
confirm the same, along with proof of purchase of the product (such as a copy of the dated
purchase invoice for the product) if the product is not registered.
• The customer must obtain a Case ID Number from D-Link Technical Support at 1-877-
453-5465, who will attempt to assist the customer in resolving any suspected defects with
the product. If the product is considered defective, the customer must obtain a Return
Material Authorization (“RMA”) number by completing the RMA form and entering the
assigned Case ID Number at https://rma.dlink.com/.
• After an RMA number is issued, the defective product must be packaged securely in the
original or other suitable shipping package to ensure that it will not be damaged in transit,
and the RMA number must be prominently marked on the outside of the package. Do not
include any manuals or accessories in the shipping package. D-Link will only replace the
defective portion of the product and will not ship back any accessories.
• The customer is responsible for all in-bound shipping charges to D-Link. No Cash on
Delivery (“COD”) is allowed. Products sent COD will either be rejected by D-Link or
become the property of D-Link. Products shall be fully insured by the customer and
shipped to D-Link Systems, Inc., 17595 Mt. Herrmann, Fountain Valley, CA 92708.
D-Link will not be held responsible for any packages that are lost in transit to D-Link. The
repaired or replaced packages will be shipped to the customer via UPS Ground or any
common carrier selected by D-Link. Return shipping charges shall be prepaid by D-Link if
you use an address in the United States, otherwise we will ship the product to you freight
collect. Expedited shipping is available upon request and provided shipping charges are
prepaid by the customer.
D-Link may reject or return any product that is not packaged and shipped in strict compliance
with the foregoing requirements, or for which an RMA number is not visible from the outside
of the package. The product owner agrees to pay D-Link’s reasonable handling and return
shipping charges for any product that is not packaged and shipped in accordance with the
foregoing requirements, or that is determined by D-Link not to be defective or non-
conforming.
What Is Not Covered: The Limited Warranty provided herein by D-Link does not cover:
Products that, in D-Link’s judgment, have been subjected to abuse, accident, alteration,
modification, tampering, negligence, misuse, faulty installation, lack of reasonable care, repair
or service in any way that is not contemplated in the documentation for the product, or if the
model or serial number has been altered, tampered with, defaced or removed; Initial
installation, installation and removal of the product for repair, and shipping costs; Operational
adjustments covered in the operating manual for the product, and normal maintenance;
Damage that occurs in shipment, due to act of God, failures due to power surge, and cosmetic
damage; Any hardware, software, firmware or other products or services provided by anyone
other than D-Link; and Products that have been purchased from inventory clearance or
liquidation sales or other sales in which D-Link, the sellers, or the liquidators expressly
disclaim their warranty obligation pertaining to the product. While necessary maintenance or
repairs on your Product can be performed by any company, we recommend that you use only
an Authorized D-Link Service Office. Improper or incorrectly performed maintenance or
repair voids this Limited Warranty.
Disclaimer of Other Warranties: EXCEPT FOR THE LIMITED WARRANTY SPECIFIED
HEREIN, THE PRODUCT IS PROVIDED “AS-IS” WITHOUT ANY WARRANTY OF
ANY KIND WHATSOEVER INCLUDING, WITHOUT LIMITATION, ANY WARRANTY
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-
INFRINGEMENT. IF ANY IMPLIED WARRANTY CANNOT BE DISCLAIMED IN ANY
TERRITORY WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED
WARRANTY SHALL BE LIMITED TO NINETY (90) DAYS. EXCEPT AS EXPRESSLY
COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN, THE ENTIRE
RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS
WITH THE PURCHASER OF THE PRODUCT.
Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK
IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR
OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE
PRODUCT, INCONVENIENCE OR DAMAGES OF ANY CHARACTER, WHETHER
DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL (INCLUDING, BUT NOT
LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOSS OF REVENUE OR
PROFIT, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, FAILURE OF
OTHER EQUIPMENT OR COMPUTER PROGRAMS TO WHICH D-LINK’S PRODUCT
IS CONNECTED WITH, LOSS OF INFORMATION OR DATA CONTAINED IN, STORED
231
D-Link Unified Access System User Manual
Product Registration
Limited Warranty
D-Link provides this limited warranty for its product only to the person or entity who originally
purchased the product from D-Link or its authorized reseller or distributor. D-Link would fulfill the
warranty obligation according to the local warranty policy in which you purchased our products.
Limited Hardware Warranty: D-Link warrants that the hardware portion of the D-Link products
described below (“Hardware”) will be free from material defects in workmanship and materials from
the date of original retail purchase of the Hardware, for the period set forth below applicable to the
product type (“Warranty Period”) if the Hardware is used and serviced in accordance with applicable
documentation; provided that a completed Registration Card is returned to an Authorized D-Link
Service Office within ninety (90) days after the date of original retail purchase of the Hardware. If a
completed Registration Card is not received by an authorized D-Link Service Office within such ninety
(90) period, then the Warranty Period shall be ninety (90) days from the date of purchase.
D-Link’s sole obligation shall be to repair or replace the defective Hardware at no charge to
the original owner. Such repair or replacement will be rendered by D-Link at an Authorized D-
Link Service Office. The replacement Hardware need not be new or of an identical make,
model or part; D-Link may in its discretion may replace the defective Hardware (or any part
thereof) with any reconditioned product that D-Link reasonably determines is substantially
equivalent (or superior) in all material respects to the defective Hardware. The Warranty
Period shall extend for an additional ninety (90) days after any repaired or replaced Hardware
is delivered. If a material defect is incapable of correction, or if D-Link determines in its sole
discretion that it is not practical to repair or replace the defective Hardware, the price paid by
the original purchaser for the defective Hardware will be refunded by D-Link upon return to
D-Link of the defective Hardware. All Hardware (or part thereof) that is replaced by D-Link,
or for which the purchase price is refunded, shall become the property of D-Link upon
replacement or refund.
Limited Software Warranty: D-Link warrants that the software portion of the product
(“Software”) will substantially conform to D-Link’s then current functional specifications for
the Software, as set forth in the applicable documentation, from the date of original delivery of
the Software for a period of ninety (90) days (“Warranty Period”), if the Software is properly
installed on approved hardware and operated as contemplated in its documentation. D-Link
further warrants that, during the Warranty Period, the magnetic media on which D-Link
delivers the Software will be free of physical defects. D-Link’s sole obligation shall be to
replace the non-conforming Software (or defective media) with software that substantially
conforms to D-Link’s functional specifications for the Software. Except as otherwise agreed
by D-Link in writing, the replacement Software is provided only to the original licensee, and is
subject to the terms and conditions of the license granted by D-Link for the Software. The
Warranty Period shall extend for an additional ninety (90) days after any replacement Software
is delivered. If a material non-conformance is incapable of correction, or if D-Link determines
in its sole discretion that it is not practical to replace the non-conforming Software, the price
paid by the original licensee for the non-conforming Software will be refunded by D-Link;
provided that the non-conforming Software (and all copies thereof) is first returned to D-Link.
The license granted respecting any Software for which a refund is given automatically
terminates.
234 © 2001- 2008 D-Link Corporation/D?Link Corporation. All Rights Reserved.
Limited Warranty (USA Only)
Trademarks
Copyright 2007 D-Link Corporation. Contents subject to change without prior notice. D-Link
is a registered trademark of D-Link Corporation/D-Link Systems, Inc. All other trademarks
belong to their respective proprietors.
Copyright Statement
No part of this publication may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission from D-
Link Corporation/D-Link Systems Inc., as stipulated by the United States Copyright Act of
1976.
FCC Warning
This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with this manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own
expense.
Technical Support
You can find software updates and user documentation on the D-Link
website.
D-Link provides free technical support for customers within the United
States and within Canada for the duration of the service period, and
warranty confirmation service, during the warranty period on this product.
U.S. and Canadian customers can contact D-Link technical support through
our website, or by phone.
237
D-Link Unified Access System User Manual
Technical Support
You can find software updates and user documentation on the D-Link websites.
If you require product support, we encourage you to browse our FAQ section on
the website before contacting the support line. We have many FAQ’s that we
hope will provide you a speedy resolution for your problem.
Technische Unterstützung
Aktualisierte Versionen von Software und Benutzerhandbuch finden
Sie auf der Website von D-Link.
Web: http://www.dlink.de
E-Mail: [email protected]
Telefon: +49 (1805)2787
0,12€/Min aus dem Festnetz der Deutschen Telekom.
239
D-Link Unified Access System User Manual
Assistance technique
Vous trouverez la documentation et les logiciels les plus récents sur
le site web D-Link.
Asistencia Técnica
Puede encontrar las últimas versiones de software así
como documentación técnica en el sitio web de D-Link.
241
D-Link Unified Access System User Manual
Supporto tecnico
Gli ultimi aggiornamenti e la documentazione sono
disponibili sul sito D-Link.
URL : http://www.dlink.it/supporto.html
Email: [email protected]
Technical Support
You can find software updates and user documentation on the D-Link website.
D-Link provides free technical support for customers within Benelux for the
duration of the warranty period on this product.
Benelux customers can contact D-Link technical support through our website, or
by phone.
243
D-Link Unified Access System User Manual
Pomoc techniczna
Najnowsze wersje oprogramowania i dokumentacji użytkownika
można znaleźć w serwisie internetowym firmy D-Link.
Technická podpora
Aktualizované verze software a uživatelských příruček najdete na
webové stránce firmy D-Link.
Web: http://www.dlink.cz/suppport/
E-mail: [email protected]
Telefon: 224 247 503
245
D-Link Unified Access System User Manual
Technikai Támogatás
Meghajtó programokat és frissítéseket a D-Link Magyarország
weblapjáról tölthet le.
Telefonon technikai segítséget munkanapokon hétfőtől-csütörtökig
9.00 – 16.00 óráig és pénteken 9.00 – 14.00 óráig kérhet
a (1) 461-3001 telefonszámon vagy a [email protected]
emailcímen.
D-Link Magyarország
1074 Budapest, Alsóerdősor u. 6. – R70 Irodaház 1 em.
Tel. : 06 1 461-3001
Fax : 06 1 461-3004
email : [email protected]
URL : http://www.dlink.hu
Teknisk Support
Du kan finne programvare oppdateringer og bruker
dokumentasjon på D-Links web sider.
Teknisk Support:
D-Link Teknisk telefon Support:
800 10 610
(Hverdager 08:00-20:00)
247
D-Link Unified Access System User Manual
Teknisk Support
Du finder software opdateringer og bruger-
dokumentation på D-Link’s hjemmeside.
Arkisin klo. 9 - 21
numerosta
0800-114 677
Internetin kautta
Ajurit ja lisätietoja tuotteista.
http://www.dlink.fi
Sähköpostin kautta
voit myös tehdä kyselyitä.
249
D-Link Unified Access System User Manual
Teknisk Support
På vår hemsida kan du hitta mer information om mjukvaru
uppdateringar och annan användarinformation.
Suporte Técnico
Você pode encontrar atualizações de software e documentação de
utilizador no site de D-Link Portugal http://www.dlink.pt.
Assistência Técnica:
Email: [email protected]
http://www.dlink.pt/support/
ftp://ftp.dlink.es
251
D-Link Unified Access System User Manual
Τεχνική Υποστήριξη
Μπορείτε να βρείτε software updates και πληροφορίες για τη χρήση των προϊόντων
στις ιστοσελίδες της D-Link
http://www.dlink.gr
ftp://ftp.dlink.it
Technical Support
You can find software updates and user documentation on the D-Link website.
Tech Support for customers in
Australia:
Tel: 1300-766-868
Monday to Friday 8:00am to 8:00pm EST
Saturday 9:00am to 1:00pm EST
http://www.dlink.com.au
e-mail: [email protected]
India:
Tel: 1800-222-002
Monday to Friday 9:30AM to 7:00PM
http://www.dlink.co.in/support/productsupport.aspx
Indonesia, Malaysia, Singapore and Thailand:
Tel: +62-21-3851275 (Indonesia)
Tel: 1800-882-880 (Malaysia)
Tel: +65 66229355 (Singapore)
Tel: +66-2-719-8978/9 (Thailand)
Monday to Friday 9:00am to 6:00pm
http://www.dlink.com.sg/support/
e-mail: [email protected]
Korea:
Tel: +82-2-890-5496
Monday to Friday 9:00am to 6:00pm
http://www.d-link.co.kr
e-mail: [email protected]
New Zealand:
Tel: 0800-900-900
Monday to Friday 8:30am to 8:30pm
Saturday 9:00am to 5:00pm
http://www.dlink.co.nz
e-mail: [email protected]
253
D-Link Unified Access System User Manual
Technical Support
You can find software updates and user documentation on the D-Link website.
Tech Support for customers in
Egypt:
Tel: +202-2919035 or +202-2919047
Sunday to Thursday 9:00am to 5:00pm
http://support.dlink-me.com
e-mail: [email protected]
Iran:
Tel: +98-21-88822613
Sunday to Thursday 9:00am to 6:00pm
http://support.dlink-me.com
e-mail: [email protected]
Israel:
Tel: +972-9-9715701
Sunday to Thursday 9:00am to 5:00pm
http://www.dlink.co.il/support/
e-mail: [email protected]
Pakistan:
Tel: +92-21-4548158 or +92-21-4548310
Sunday to Thursday 9:00am to 6:00pm
http://support.dlink-me.com
e-mail: [email protected]
South Africa and Sub Sahara Region:
Tel: +27-12-665-2165
08600 DLINK (for South Africa only)
Monday to Friday 8:30am to 9:00pm South Africa Time
http://www.d-link.co.za
Turkey:
Tel: +90-212-2895659
Monday to Friday 9:00am to 6:00pm
http://www.dlink.com.tr
e-mail: [email protected]
e-mail: [email protected]
U.A.E and North Africa:
Tel: +971-4-391-6480 (U.A.E)
Sunday to Wednesday 9:00am to 6:00pm GMT+4
Thursday 9:00am to 1:00pm GMT+4
http://support.dlink-me.com
e-mail: [email protected]
Техническая поддержка
Обновления программного обеспечения и документация
доступны на Интернет-сайте D-Link.
255
D-Link Unified Access System User Manual
Asistencia Técnica
D-Link Latin América pone a disposición de sus clientes, especificaciones,
documentación y software mas reciente a través de nuestro Sitio Web
www.dlinkla.com
El servicio de soporte técnico tiene presencia en numerosos países de la
Región Latino América, y presta asistencia gratuita a todos los clientes de
D-Link, en forma telefónica e internet, a través de la casilla
[email protected]
Soporte Técnico Help Desk Argentina:
TTeléfono: 0800-12235465 Lunes a Viernes 09:00 am a 22:00 pm
Soporte Técnico Help Desk Chile:
Teléfono: 800 8 35465 Lunes a Viernes 08:00 am a 21:00 pm
Soporte Técnico Help Desk Colombia:
Teléfono: 01800-9525465 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk Ecuador:
Teléfono: 1800-035465 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk El Salvador:
Teléfono: 800-6335 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Guatemala:
Teléfono: 1800-8350255 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Panamá:
Teléfono: 00800 0525465 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk Costa Rica:
Teléfono: 0800 0521478 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Perú:
Teléfono: 0800-00968 Lunes a Viernes 07:00 am a 20:00 pm
Soporte Técnico Help Desk República Dominicana:
Teléfono: 1888 7515478 Lunes a Viernes 06:00 am a 19:00 pm
Soporte Técnico Help Desk Venezuela:
Teléfono: 0800-1005767 Lunes a Viernes 08:00 am a 21:00 pm
Suporte Técnico
Você pode encontrar atualizações de software e documentação
de usuário no site da D-Link Brasil www.dlinkbrasil.com.br.
E-mail:
e-mail: [email protected]
257
D-Link Unified Access System User Manual
Dukungan Teknis
Update perangkat lunak dan dokumentasi pengguna dapat
diperoleh pada situs web D-Link.
259
D-Link Unified Access System User Manual
Registration Card
All Countries and Regions Excluding USA