Belair 100 User Manual
Belair 100 User Manual
BelAir100
User Guide
Release: 6.0
Document Date: June 30, 2006
Document Number: BDTM10001-A05
Document Status: Standard
Security Status: Confidential
Customer Support: 613-254-7070
1-877-BelAir1 (235-2471)
[email protected]
© Copyright 2006 by BelAir Networks.
The information contained in this document is confidential and proprietary to BelAir Networks. Errors and Omissions Excepted.
Specification may be subject to change. All trademarks are the property of their respective owners.
Page 1 of 147
BelAir100 User Guide Contents
Contents
About This Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
BelAir100 Wireless Multi-service Node . . . . . . . . . . . . . . . . . . . . . 4
System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
BelAir100 Configuration Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . 8
Command Line Interface Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Common Radio Module Configuration Commands . . . . . . . . . . . 32
Access Radio Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Backhaul Link Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Managing Access Radio SSIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Layer 2 Network Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Using Layer 2 Tunnels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Quality of Service Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
BelAir100 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Performing a Software Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
BelAir100 Network Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
For More Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Definitions and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Appendix A: Node Configuration Sheets . . . . . . . . . . . . . . . . . . 126
Appendix B: BelAir100 Factory Defaults . . . . . . . . . . . . . . . . . . 129
Appendix C: Connecting to the Ethernet Interface . . . . . . . . . . 136
Detailed Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
System Overview
The BelAir100 can operate as a standalone device, or participate in a BelAir
Networks multiple point-to-point mesh as an edge node or to terminate the
mesh where the full functionality of the BelAir200 is not required.
A typical BelAir100 configuration will include one access radio and one
backhaul radio using the integral antennas.
In this configuration, the BelAir100 unit provides access to mobile users
through 802.11b or 802.11g radio links at 2.4 GHz, or through 802.11a radio
links at 5 GHz. As shown in Figure 2, the typical deployment scenario is to use
both BelAir100 units and BelAir200 units to illuminate a building from the
outside to provide coverage throughout the building. The BelAir100 can also
provide outdoor coverage and act as a mesh portal for a cluster of BelAir50C
or BelAir50S nodes.
Figure 2: Access Radio Coverage
Alternatively, the BelAir100 can also be configured to use two backhaul radios.
In this configuration, the BelAir100 provides wireless backhaul between nodes
using 5 GHz 802.11a links.
Hardware Figure 3 shows the relationship between the main BelAir100 hardware
modules.
Description
Figure 3: BelAir100 Hardware Module Block Diagram
Radio Radio
Module Module
LPM
PSU
BelAir100 Layer 2 At the layer 2 (data-link) layer, the BelAir100 acts as a bridge and layer 2 switch.
See Figure 4.
View
The layer 2 switch ports are connected to the BelAir100 input/output devices,
such as the access radio and backhaul radios. The BelAir100 layer 2 switch
forwards layer 2 frames to the output of one or multiple ports based on the
information contained in the frame header.
Figure 4: BelAir100 Layer 2 View, Typical Configuration
Wireless
Access
Point
Backhaul and
Mesh Links BelAir100 - Layer 2
Line Interface
Command Line The CLI allows you to configure and display all the parameters of a BelAir100
unit, including:
Interface
• system parameters
• system configuration and status
• radio module configuration and status
• user accounts
• BelAir100 traffic statistics
• layer 2 functionality, such as those related to bridging and VLANs
• alarm system configuration and alarms history
For a description of basic CLI commands and tasks see “Command Line
Interface Basics” on page 12.
BelAir100 SNMP The Simple Network Management Protocol (SNMP) provides a means of
communication between SNMP managers and SNMP agents. The SNMP
Interface manager is typically a part of a network management system (NMS) such as HP
OpenView, while the BelAir100 provides the services of an SNMP agent.
Configuring the BelAir100 SNMP agent means configuring the SNMP
community names and trap destinations to establish a relationship between the
manager and the agent.
Integrating the In addition to providing support for the SNMP MIBs described in Table 2, BelAir
BelAir100 with a Networks provides a number of enterprise MIB definitions that you can
Pre-deployed NMS integrate with your Network Management System (NMS). Table 3 on page 9
describes the BelAir100 SNMP MIBs. A copy of the BelAir100 SNMP MIBs is
available from the BelAir Networks online support center at:
www.belairnetworks.com/support/index.cfm.
The procedure for importing the SNMP MIB definition files depends on the
deployed NMS platform. Refer to your NMS platform documentation for
details.
BelAir100 Web Refer to the BelAir100 Web Interface Guide for details on accessing and using
this interface.
Interface
Supported Web BelAir Networks has verified that the BelAir100 Web interface operates
Browsers and Platforms correctly with the following web browsers:
• Microsoft Internet Explorer version 5.0, or later
• Netscape Navigator version 6.0, or later
Accessing the Web You can access the Web interface using either secure HTTP (HTTPS) or HTTP.
Interface Both HTTP and HTTPS are enabled when each BelAir100 node is shipped.
Note: By default, the BelAir100 Web interface has an associated time-out
value. If the interface is inactive for 30 minutes, then you are
disconnected from the interface. To reconnect to the interface, you
need to log in again. See BelAir100 System Command Line Interface
Guide to alter this default period.
Accessing the System To log in to the BelAir100 Web interface and access the main page using HTTPS
Page with Secure HTTP or HTTP, do the following steps:
or with HTTP
1 Open your Web browser and specify the IP address of the BelAir100 node
you want to access.
The default IP address of each BelAir100 node is: 10.1.1.10.
A Login page is displayed.
2 Enter a valid user name, such as root, and a valid password.
Note:The specified password is case sensitive.
If successful, the BelAir100 Web interface System page is displayed.
Connecting to the You can connect to the BelAir100 default address using one of the following
methods:
BelAir100
• through the BelAir100 radio interface
• by connecting directly to the Ethernet port on the BelAir100
CAUTION! Do not connect the BelAir100 to an operational data network before you
configure its desired IP network parameters. This may cause traffic disruptions
due to potentially duplicated IP addresses.
In all cases, the BelAir100 unit must connect to an isolated LAN, or to a
desktop or laptop PC configured to communicate on the same IP sub-network
as the BelAir100.
Starting a CLI Start a Telnet or secure shell (ssh) client and connect to the BelAir100 IP
address. Each BelAir100 can have up to eight simultaneous Telnet or ssh
Session sessions. If you are configuring the BelAir100 for the first time, you must use
the BelAir100 default IP address (10.1.1.10). The BelAir100 prompts you for
your user name and password.
The default super-user account is “root”. The default password is “admin123”.
If the login is successful, the BelAir100 prompt is displayed. The default prompt
is “#”, if you login as root. Otherwise, the default prompt string is “>”.
Note 1: The terminal session locks after four unsuccessful login attempts. To
unlock the terminal session, you must enter the super-user password.
Note 2: BelAir100 CLI commands are not case sensitive (uppercase and
lowercase characters are equivalent). However, some command
parameters are case sensitive. For example, passwords and any Service
Set Identifier (SSID) supplied with the radio commands are case
sensitive. Also, all parameters of the syscmd commands are case
sensitive.
Password:
/#
Command Modes The BelAir100 CLI has different configuration “modes”. The available
commands depend on the selected mode. Their list can be displayed using the
help command. Table 4 on page 14 describes the modes that are supported.
Table 4: Command Line Interface Modes
Mode Description
“root” mode (/) The top or root level of the CLI commands. Mostly display
(show) commands.
Administration
Wireless
Mode Description
Use the mode command to display all the available modes. For a description of
additional modes, see:
• BelAir100 System Command Line Interface Guide
• BelAir100 Radio Command Line Interface Guide
Users can move between modes with the cd command. For instance, you can
move from the radio mode to the system mode using the command:
/radio# cd /system
/system#
executes a command from the snmp mode while in the system mode.
Abbreviating You must enter only enough characters for the CLI to recognize the command
as unique.
Commands
The following example shows how to enter the root mode command show
system config:
/# sh syst c
Command You can use the history command to display a list of the last ten commands that
you have typed.
History
Example
/# history
22 /snmp/snmp-community 4 community-name belairmgmt
ipaddr 0.0.0.0 privilege readwrite
23 cd /system
24 show sessions
25 cd /snmp
26 show snmp-community config
27 cd /radio
28 help
29 cd /
30 whoami
31 show user
• a list of commands starting with the given keyword in the current mode
You can use "?" as an alternative for the word "help".
When "help" or "?" is typed in the required mode, all commands present in that
mode as well as all general commands are listed.
Example
/system# help
show version
show alarms <number of alarms>
[type {all|dcom|eqpt|sw|qos|env|secu|sys}]
[severity {all|critical|major|minor|warning|info}]
show alarm history <number of entries>
[type {all|dcom|eqpt|sw|qos|env|secu|sys}]
[severity {all|critical|major|minor|warning|info}]
[<start_idx>]
set alarm type mask {all|dcom|eqpt|sw|qos|env|secu|sys}
set alarm severity mask {all|critical|major|minor|warning|info}
show alarm mask
show phyinv
show temperature internal
show temperature limit upper
show temperature limit lower
show battery present
show battery voltage
When a keyword is typed, all possible commands starting from that keyword
are displayed.
Example
/system# help system
[Syntax] : system [switch <name>] [contact <firm>] [location <place>]
Description : configures system parameters
[Syntax] : system [default-ipaddr <ip addr>] [subnet-mask < mask >]
[default-interface <name>]
Description : configures system parameters
When help is needed for a specific command, enter the command within
quotes along with the word help.
Example
/system# help "reboot"
[Syntax] : reboot [{force}]
Description : Directs the node to reboot.
When an abbreviation is used in the help string, all matching commands are
listed with the description.
Example
/system# help "reb"
[Syntax] : reboot [{force}]
Description : Directs the node to reboot.
Terminating your You can terminate your own CLI session at any time by entering the exit
command.
CLI Session
User Administration
For full details on user administration functions, see the BelAir100 System
Command Line Interface Guide.
User Privilege User accounts on the BelAir100 can be assigned the following three privilege
levels:
Levels
• An observer user can execute only the following commands:
—most show commands
—the help and ? commands
—the passwd command
—the clear and exit commands
—the cd and mode commands
—the history command
—the whoami command
—the ping command
• A normal user can execute any CLI command, except those reserved for
the super-user.
• The super-user can execute any CLI command. CLI Commands for the
following functions are reserved for the super-user:
—user administration
—session access and control
—SNMP setup and configuring SNMP access
—first time configuration (country code and unit’s IP settings)
—remote backup and restore of the configuration database, including
reboot and all syscmds commands
—software upgrade
—all SSH, all SSL and most SYSLOG commands
—debug commands
Each unit can have any number of observer users and normal users, but only
one super-user account, called root.
Example
/# adduser testuser -p userpwd - d system
Example
/# deluser xyz
Modifying User moduser <user-name> [-p <passwd>] [-d <mode>] [-g <group>]
Example
In the following example, the user guest begins their session in radio mode and
their password is changed to “guest123”.
/# moduser guest –p guest123 –d radio
Available User This command is only available if you are logged in as root.
Accounts This command lists all valid user accounts, the mode in which they start their
session and their maximum privilege level. For example, under Groups, normal
users display NORMAL OBSERVER while the root account displays root
NORMAL OBSERVER.
This is a common command that can be used while in any mode.
Example
/# show user
USER MODE GROUPS
root / root NORMAL OBSERVER
user1 / OBSERVER
user2 / OBSERVER
user3 RADIO NORMAL OBSERVER
Changing Your You can change your current password with the passwd command. You will be
first asked to enter your old password. Then you must enter your new
Password password twice, to verify that you have typed it correctly.
Note: The specified password is case sensitive and must be at least six
characters long.
Configuring You can use a RADIUS server to authenticate users as they login to their
accounts.
Authentication
for User
Accounts
Selecting the authentication login {local|radius}
authentication mode
This command is only available if you are logged in as root.
This command determines how the BelAir100 authenticates users.
The local setting means that the BelAir100 uses the locally stored password and
user account information to authenticate the user. This is the default setting.
The radius setting means that the BelAir100 uses a RADIUS server to
authenticate the user.
To use this command, you must be in system mode.
Example
authentication login radius
Adding RADIUS Servers add radius-server <IP address> <port> <shared secret>
[interface <NAS IP address>] [timeout <seconds>]
This command is only available if you are logged in as root.
This command specifies a RADIUS server that you can use to authenticate
users. Up to five servers can be defined in a list. By default, the first server in
the list is used. If the first server is not available, then the second server is used.
This continues for every server on the list.
To use this command, you must be in system mode.
The IP address parameter specifies the IP address of the RADIUS server.
The port parameter specifies the UDP port number of the RADIUS server
(typically 1812).
The shared secret parameter specifies the password for access to the RADIUS
server.
The NAS IP address parameter specifies the Network Access Server (NAS) IP
address for the BelAir100 RADIUS client. It is used when the unit is configured
with multiple IP interfaces and matches the interface used to communicate with
the given RADIUS server. The default value is the IP address of the unit’s
management interface, which is usually VLAN1.
Note: The NAS IP address parameter is entered statically with this command.
If the VLAN IP addresses are determined dynamically with a DHCP
server, then an updated VLAN IP address is not automatically reflected
into the NAS IP address parameter.
The timeout parameter specifies the interval (in seconds) after which the
RADIUS client considers that the remote server has timed out if a reply is not
received. The default value is 10 seconds.
Note: Make sure the user’s privilege level are correctly specified in the
RADIUS Reply-Message field. Refer to “Adding User Accounts” on
page 20.
Examples
add radius-server 172.16.1.25 1812 ”radius-shared-secret”
interface 10.1.1.2
Example
del radius-server 172.16.1.25
Example
/system# show authentication login
Authentication Login is radius
Radius Authentication server table
-------------------------------------
Index : 1
Radius Server Address : 10.1.1.2
UDP port number : 1812
Radius Client Address : 0.0.0.0
Timeout : 10
--------------------------------------------
System Settings
This chapter contains procedures for managing BelAir100 parameters as
follows:
• “Displaying the BelAir100 Node and IP Parameters” on page 25
• “Configuring the BelAir100 System Parameters” on page 25
• “Configuring the System IP Parameters” on page 26
• “Configuring the System Date and Time” on page 27
• “Displaying Inventory and Status Parameters” on page 28
• “Saving and Restoring the BelAir100 Configuration” on page 29
For full details on system settings, see the BelAir100 System Command Line
Interface Guide.
BelAir100 Node This command displays the system’s configuration. To use this command you
must be in system mode.
and IP Parameters
Example
/# show system configuration
BelAir System configuration
--------------------------
Software version : BA50c 4.1.0
Default IP Addr Config Mode : Manual
Switch name :
Switch Contact :
Switch Location :
Switch base MAC address : 00:0d:67:00:00:48
Default IP Address : 10.1.1.10
Subnet Mask : 255.255.255.0
Effective IP Address : 10.1.1.10
Default Interface Name : eth0
Logging Option : Console
BelAir100 System This command configures the system parameters such as switch name, switch
contact information and physical switch location. To use this command you
Parameters must be in system mode.
Example
The following example sets the system name to BA200-A, the contact
information to BelAirNetworks and its location to PoleNumber1.
cd /system
system switch BA200-A contact BelAirNetworks location PoleNumber1
Configuring the You can configure a static IP address and subnet mask, as well as static IP
routes. To configure dynamic IP addressing, see the BelAir100 System
System IP Command Line Interface Guide.
Parameters
Setting a Static IP system [default-ipaddr <ip addr>][subnet-mask < mask >]
Address and Subnet [default-interface <name>]
Mask This command is only available if you are logged in as root.
This command configures the system parameters such as default IP address,
subnet mask and default interface.
The BelAir100 uses internal IP addresses in the range of 192.168.1.x,
192.168.2.x and 192.168.3.x. As a result, users should not configure the
BelAir100 to use any IP addresses within these ranges.
To use this command you must be in system mode.
Example
/#cd system
/system# system default-ipaddr 10.6.4.135 subnet-mask
255.255.255.0 default-interface eth1
Displaying the Static IP By default, the routing tables are configured to allow the BelAir100 to
Routing Tables communicate with IP hosts on the same sub-network.
To display the static IP routing tables, use the following root (/) mode
command:
show route
Configuring the Static IP If you need to reach the management interface of your unit from other
Routing Tables sub-networks, you must obtain the IP address of your network gateway from
your administrator and add the appropriate routes.
Extra static IP routes can be added from the ip mode with the following
command:
ip route add <dest ip addr> <dest mask> gw <gateway>
<dest mask> is the destination subnet mask.
<gateway> is the IP address of network gateway.
Configuring the You can manage the system date and time from the system mode. The system
date and time can be configured:
System Date and
Time • manually
• using a Simple Network Time Protocol (SNTP) server
Example
/#cd system
/system# show date
Current date: 2004-02-10 06:52:20
Example
/#cd system
/system# set date 2004-02-10
Example
/#cd system
/system# set time 06:50:00
Obtaining Time from a The BelAir100 supports the Simple Network Time Protocol (SNTP) by
Time Server providing an SNTP client that can synchronize the unit date and time with any
SNTP compatible external time server.
Example
/#cd system
/system# show sntp ip address
Example
/#cd system
/system# set sntp ip address 10.1.1.2
Example
/#cd system
/system# set sntp enable
Displaying You can display the inventory and status parameters from system mode.
Inventory and
Status Parameters
Displaying Unit show phyinv
Inventory Information To use this command you must be in system mode. This command displays the
manufacturing parameters (name, serial number and part version numbers) of
the equipment parts contained in a unit.
Example 1
/#cd system
/system# show temperature internal
36
Example 2
/#cd system
/system# show temperature limit upper
85
Saving and To save changes from the system defaults, the following options are available:
Restoring the • Save each of the system and radio module parameters to local files. These
BelAir100 are applied after reboot and can restore the configuration. Refer to:
Configuration —“Local Back Up of the Configuration Database” on page 29
—“Saving and Restoring Node Configuration Parameters” on page 29
• Create a backup of the configuration database and store it remotely on a
TFTP server. This option consists of aggregating all of the local configuration
files, and other critical system files. The aggregate file is then moved to a
remote location. The system can then be restored from this remote backup
file. Refer to “Remote Back Up and Restore of the Configuration Database”
on page 30.
Local Back Up of the The following command is available from any mode and saves the entire
Configuration Database configuration database (including the system and radio module configuration) to
persistent storage. The stored configuration is automatically applied at the next
reboot.
config-save
These commands save and restore the country of operation, the alarm type
mask and the alarm severity mask to persistent storage. The parameters are
automatically activated the next time the system reboots.
Note: To restore the node parameters, you must be logged in as root.
Example 1
/#cd system
/system# save node_config
Example 2
/#cd system
/system# restore node_config
Remote Back Up and To provide support for business continuity after a catastrophic event, the
Restore of the configuration data of a BelAir100 unit can be:
Configuration Database • backed up and saved to a remote server
• restored from a previously backed up copy
You can use either TFTP or FTP to communicate with the remote server. By
default, TFTP is used.
For example:
config-save active remoteip 10.1.1.1 remotefile Node100.backup.2.0.0.20_2004_04_12
If you specify FTP, you can also specify the user name and password. The default
FTP user name is anonymous and the default FTP password is root@<nodeip>,
where <nodeip> is the IP address of node making the request. If you do not
use the default FTP username, the FTP server must be configured to accept
your username and password. Refer to the BelAir100 System Command Line
Interface Guide for a complete description of the config-save command.
Note: The remote server must be configured to allow file uploads. By default,
most TFTP or FTP servers disallow file uploads.
Displaying the You can display the configured parameters of a radio module using radio mode
show commands.
Radio
Configuration The following show commands are the ones used most often:
show {arm<n>|brm<n>} config
show brm<n> status
show {arm<n>|brm<n>} mac-address
show {arm<n>|brm<n>} mac configuration
The following sections describes each of these commands in more detail.
Example 1
/# cd radio
/radio# show arm1 config
mode : enable [ap]
Channel : 3
Privacy : enabled
Rx Antenna : main
Antenna Diversity : disabled
TX antenna type : 3 (8 dbi)
Tx Power : 27 dBm
Profile : Mixed B/G
SSID Information
--------------------------------------------------
id vlan type mb wb sp security acl ssid
-- ---- ---- -- -- -- -------- --- ------------
1 620 normal * * . wpa-psk . BRM3-Mesh1
2 -- suppress . . . wep . BRM3-Mesh1_man
==================================================
For SSID information in the previous example, encryption settings are displayed
as follows:
• a dot ( . ) means that the encryption setting is disabled for that particular
SSID
• the word yes means that the encryption setting is enabled for that particular
SSID
• a dash ( - ) means that information is not available
Example 2
/# cd radio
/radio# show brm1 config
Example 1
The following example shows a typical output when the backhaul link is
operational.
/# cd radio
/radio# show brm1 status
Local Node Information
======================
Link state : up
Current active channel : 56
Local RSSI : -78 dbm
BRM MAC address : 00:0d:67:00:03:a3
Tx power state : low
Tx power level : 8 dBm
Country : UNITED STATES
TPC admin state : disabled
DFS admin state : enabled
Example 2
The following example shows a typical output when the backhaul link is not
operational.
/# cd radio
/radio# show brm1 status
Local Node Information
======================
Link state : down
Current active channel : 148
BRM MAC address : 00:0d:67:00:1e:12
Tx power state : high
Tx power level : 17 dBm
Country : UNITED STATES
TPC admin state : enabled
DFS admin state : enabled
Example
/# cd radio
/radio# show arm1 mac-address
00:0d:67:00:00:0a
Example
/# cd radio
/radio# show arm1 mac configuration
rts threshold : 2347
fragment threshold : 2346
short retries : 8
long retries : 4
auth-response timeout : 500
assoc-response timeout : 500
The set arm <n> mode command applies only to radios with part numbers
B2CC000AA, B2CC000AB, B2CC011AA, B2CC011AA, B2CC043AA. If
switched on, the access radio must be configured as an Access Point. If set to
disable, the access radio is switched off.
Example
/# cd radio
/radio# show arm1 antenna-type
Antenna : External
Antenna Type : 0
Antenna Gain : 0.00dBi
TYPE GAIN State
---- ---- -----
1 4.00 --
2 7.00 --
3 9.00 --
4 10.00 --
5 10.25 --
6 10.50 --
7 12.00 --
8 13.50 --
9 15.00 --
10 23.00 --
Example 2
/# cd radio
/radio# set brm1 channel 52 secondary 149
Example 3
/radio# show brm1 channel
48 (secondary 149)
Example
The following command displays possible transmit power settings for an access
radio with part numbers B2CC011AA, B2CC011AB or B2CC043AA:
/# cd radio
/radio# show arm1 tx power
TX antenna : 2
Channel : 5
Country : US
Index Power(dBm) State
----- ---------- --------
1 26 --
2 25 --
3 23 --
4 21 --
5 19 current
6 17 --
7 15 --
8 13 --
Selection These commands let you manage the Dynamic Frequency Selection (DFS)
feature. The set command is only available if you are logged in as root.
These commands apply only if your unit contains a radio with part numbers
B2CC034AA, B2CC034AB or B2CC033AA. Use the /system/show phyinv
command to display the radio’s part number.
Dynamic Frequency Selection (DFS) is a regulatory requirement in some
jurisdictions. It is normally set automatically when specifying the country of
operation.
The show command displays various parameters associated with DFS. The
default value of the secondary channel is 0, instructing DFS to operate as if the
secondary channel is the same as the primary channel.
The set command suppresses any use of DFS by the set country
<country_code> command. When disabled with this command, DFS remains
disabled for all radio channels until re-enabled by this command.
CAUTION! Improper setting of DFS may exceed regulatory requirements and void the
operator’s right to operate the radio equipment.
For details on specify the country of operation, see:
• BelAir100 Installation Guide
• BelAir100 System Command Line Interface Guide
Example 1
/radio# show brm1 dfs
DFS admin state: enabled
Current channel: 161
CHANNEL DFS radar radar elapsed
required type detected time
------- --------- --------- -------- -----------
161 ( primary ) yes fcc no 15 min
055 (secondary) no fcc no n/a
Example 2
/# cd radio
/radio# set brm1 dfs disabled
Client You can display information about the clients that are associated, or that were
recently associated to the AP.
Information
Displaying the Number show arm<n> client associated [ssidx <ssid_index>]
of Associated Clients This command displays the list of associated wireless clients for a given SSID. If
no SSID is specified, the displayed list shows all associated clients and their
SSID.
The ssid_index parameter must be a valid SSID index. The default value is 1.
Table 5 explains the various fields in the resultant output.
Field Description
Field Description
Field Description
dhcp Client DHCP state (applicable only if client uses dynamic IP addressing)
init Client has just connected and has not yet started a DHCP
sequence
disc Client has sent a DHCP Discover message and is waiting for a
DHCP Offer message to get its IP address.
(Applicable only if client does not already have a valid IP address.
Otherwise client sends DHCP Request message.)
req Client has sent the DHCP Request message to the server and is
waiting for a a DHCP Ack message to confirm the assigned IP
address.
decl Server has declined the client’s DHCP request. Verify the server
settings.
ack Client has sent a DHCP Request message and the server has
confirmed the assigned IP address.
(Considered a DHCP complete state.)
nack Server has responded to the client’s DHCP request with a DHCP
Nack message. Verify the server settings.
arpRes Client has gone through one of the DHCP state transitions and
replied to an ARP request for its IP address.
(Considered a DHCP complete state.)
Example
/# cd radio
/radio# show arm1 client associated
Total associated clients : 2
Example
/# cd radio
/radio# show arm1 client 35 details
id : 35
address : 00:40:96:38:2e:03
state : associated (5)
age : 594 secs
rssi : -82 dBm
Access Radio If your unit contains a radio with part numbers B2CC011AA, B2CC011AB or
B2CC043AA, then you can customize the following:
Transmission
• whether the radio uses 802.11b rates, 802.11g rates or both
Rates
• some of the settings for the rates that are used
Use the /system/show phyinv command to display the radio’s part number.
If your unit contains a radio with part number B2CC033AA, then it is providing
802.11a radio links and the data transfer rates cannot be changed.
Example 1
/# cd radio
/radio# show arm1 profile
Profile: B-only
Example 2
/# cd radio
/radio# show arm1 profile
Profile: Mixed
Backhaul Link The BelAir100 can be configured with the following types of links to form a
mesh for backhaul traffic:
Types
• 5 GHz multiple point-to-point (P-to-P)—Any BelAir node containing a radio
with part numbers B2CC001AA, B2CC001AB, B2CC034AA, B2CC034AB
or B2CC033AA can provide P-to-P backhaul links.
• 2.4 GHz multipoint-to-multipoint (MP-to-MP)—To create these types of
links, the BelAir node must contain a radio with part numbers B2CC011AA,
Example
/# cd radio
/radio# set brm1 ssid BelAirNetworks
Example 1
/# cd radio
/radio# show brm1 tpc
TPC admin state : enabled
TPC operation state : up
Link : associated
Channel : 64
Country : Canada
TPC tx power state : high
Tx power level : 14 dBm
Local rssi : -39 dbm
Peer rssi : -30 dbm
Example 2
/# cd radio
/radio# set brm1 tpc enabled
5 GHz P-to-P The commands that you use depend on the type of radio that you are using.
Use the /system/show phyinv command to display the radio’s part number.
Links
Backhaul Radios with Part Number B2CC033AA
This type of radio can form backhaul links only with other radios with the same
part number. As well, the radios do not need to have a Client and Access Point
relationship. However, the radio’s topology must be set to p2p.
With these types of radios, a wireless backhaul link (or association) can be
established between two backhaul radios if all the following conditions are met:
• Both are configured on the same channel. Refer to “Channel Number” on
page 37 for the appropriate command.
• Both are configured with the same link identifier.
The following command configures the radio for a basic 5 GHz (P-to-P) link
topology without privacy.
set brm<n> link identifier <lnk_id> topology p2p
The <link_id> parameter is case sensitive and can be up to 32 alphanumeric
characters. For P-to-P links, BelAir Networks recommends that the link
identifier describes the link; that is, the nodes it connects.
MP-to-MP Links This command lets you manage the configuration of a 2.4 GHz MP-to-MP
backhaul link.
The <link_id> parameter is case sensitive and can be up to 32 alphanumeric
characters. For MP-to-MP links, the link identifier is also known as a mesh
identifier. It is the same for all members of a particular mesh cluster.
Example
/radio# set arm1 link topology mesh identifier BelAir-mesh
Links This command lets you manage the configuration of a 5 GHz MP-to-MP
backhaul link.
The <link_id> parameter is case sensitive and can be up to 32 alphanumeric
characters. For MP-to-MP links, the link identifier is also known as a mesh
identifier. It is the same for all members of a particular mesh cluster.
Example
/radio# set brm1 link topology mesh identifier BelAir-mesh
Example
/radio# set brm1 link topology star role bs index 1,2,3,7
Link index provisioning successful
Additional The following sections describe additional commands for both a 2.4 GHz mesh
cluster or a 5 GHz mesh cluster.
MP-to-MP Link
Commands
Displaying MP Link show {arm<n>|brm<n>} link
Information [{config|detail|provisioned|statistics [<lnk_id>]}]
This command lets you display the current settings of various parameters for
2.4 GHz MP-to-MP, 5 GHz MP-to-MP or 5 GHz P-to-MP links.
The <lnk_id> parameter applies only to P-to-MP links. It identifies the specific
link that the commands applies to.
Example 1
/radio# show arm1 link config
Link Identifier : BelAir Networks Mesh
Link Topology : Mesh (enabled)
Portal State : no
Isolate RSTP : yes
Privacy : enabled (key:1234567890abcdef)
Example 2
/radio# show arm1 link detail
Link Identifier : BelAir Networks Mesh
Link Topology : Mesh (enabled)
Portal State : no
Isolate RSTP : yes
Privacy : enabled (key:1234567890abcdef)
Link RadioMAC State RSSI Radio NodeIP Rx Pkts Tx Pkts
---- ----------------- ----- ---- ----- --------------- ----------- -----------
1 00:0d:67:00:4c:9e fwd -38 arm1 10.1.3.101 223139 97301
Example 3
/radio# show brm1 link provisioned
Current link provisioned : 1, 2, 3, 7
Example 4
/radio# show brm1 link statistics
Link RadioMac Rx_Pkts Tx_Pkts Rx_Bytes Tx_Bytes Rx_Errs Tx_Errs
---- -------- ------- ------- -------- -------- ------- -------
1 00:0d:67:00:43:e7 4051 6301 127885 235458 0 0
Example
/radio# set arm1 mesh-state disable
Example
/radio# show arm1 traffic-limit
Radio traffic limit is 4000 kBit/s
Example
/radio# show arm1 mesh-topology
Link Identifier : PVStn5_Ba50Mesh
Link Topology : Mesh (enabled)
Portal State : no
Isolate RSTP : yes
Privacy : enabled (key:1234567890abcdef)
Link Active : 1
Link Matrix
1 2 3
------+------+------+
1| | -67* | -53* |
|------+------+------+
2| -65* | | -68 |
|------+------+------+
3| -50* | -71* | |
|------+------+------+
In the previous example, you are currently accessing the node with a MAC
address of 00:0d:67:00:33:c4. Your node contains a radio module with a MAC
address of 00:0d:67:00:33:c5 that is forming a multipoint mesh with two other
radio modules.
The link matrix displays the RSSI value as seen from each end. Row 1 column 2
shows -67 meaning that according to Node 1, the link to Node 2 has an RSSI
value of -67 dBm. Row 2 column 1 shows -65 meaning that according to
Node 2, the link to Node 1 has an RSSI value of -65 dBm. A slight variance in
the RSSI value, as seen from both ends, is normal because one radio receiver
may be slightly more sensitive than the other, or the associated antenna gain
may be slightly different.
Typically, these commands are used to disable an unstable link. This behavior
may occur when either radio at each end of the link is operating at the limit of
its sensitivity.
As well, these commands can be used to disable a particular link if the RF plan
for the cluster predicts low RSSI values for it.
Example
/radio# show arm1 blacklist
1 00-0d-67-00-2a-80
Example
show arm1 mesh-survey
12345678
RadioMac CH Priv RSSI TOP Role LinkIdx Age LinkIdentifier
-------- -- ---- ---- --- ---- -------- --- --------------
00:12:88:de:2c:01 6 undef-75 p2p -- -------- N
00:0d:67:00:75:c8 3 aes -48 mesh -- -------- N BelAirNetworks MESH
00:12:88:de:0a:09 6 undef-61 mesh -- -------- N
00:0d:67:00:33:db 3 aes -68 mesh -- -------- N BelAirNetworks MESH
00:11:95:38:3d:83 6 undef-74 p2p -- -------- N
00:13:10:77:74:99 6 undef-73 mesh -- -------- N
Example 1
/radio# accept arm1 mesh
These remote mesh points have been accepted:
00:0d:67:00:2d:7d
00:0d:67:00:2d:c0
00:0d:67:00:1f:4a
00:0d:67:00:01:05
00:0d:67:00:2d:af
00:0d:67:00:14:87
Number of accepted remote mesh points: 6
Example 2
/radio# show arm1 mesh-accepted
These remote mesh points have been accepted:
00:0d:67:00:2d:7d
00:0d:67:00:2d:c0
00:0d:67:00:1f:4a
00:0d:67:00:01:05
00:0d:67:00:2d:af
00:0d:67:00:14:87
Number of accepted remote mesh points: 6
Associated and This feature applies only to radios with part numbers B2CC001AA,
B2CC001AB, B2CC034AA and B2CC034AB. It allows you to control which
Peer Backhaul nodes establish backhaul links in a point-to-point mesh configuration.
Radio MAC
The associated backhaul radio MAC address is the MAC address of the remote
Addresses backhaul radio of an established backhaul link. Its default value is null
(00:00:00:00:00:00), indicating no established link. It is dynamically set when the
backhaul radio associates itself with another backhaul radio with matching SSID,
physical channel and complementary mode.
The currently associated backhaul radio MAC address can be displayed with the
following command:
show brm<n> associated mac address
The peer MAC address is the MAC address of the desired remote backhaul
radio to which the local backhaul radio should associate. Its default value is also
null (00:00:00:00:00:00) and can be set in two ways:
• accept the currently associated backhaul radio MAC address
• statically configure the desired backhaul radio MAC address
Accepting the Currently To accept the currently associated backhaul radio as the desired peer backhaul
Associated Backhaul radio, use the following command:
Radio
accept brm<n> associated mac address
This command copies the value of the currently associated backhaul radio MAC
address to the peer MAC address.
Statically Configuring The peer backhaul radio MAC address can be set with the desired remote
the Peer Backhaul Radio backhaul radio’s MAC address with the following command:
MAC Address
set brm<n> peer mac address <mac address>
Example
/radio# set brm1 peer mac address 00:0d:67:00:21:8f
The backhaul radio can only associate itself with a remote backhaul radio with
the specified MAC address.
Discarding the If the backhaul radio has associated itself with an undesired backhaul radio, the
Associated Backhaul current associated backhaul radio MAC address can be discarded, so that the
Radio MAC Address pre-configured peer can become associated. To do so, use the following
command:
discard brm<n> associated mac address
Example
/radio# discard brm1 associated mac address
/radio# show associated mac address
00:00:00:00:00:00
Changing the Peer To change the value of the peer backhaul radio MAC address, use the following
Backhaul Radio MAC command:
Address
discard brm<n> peer mac address
This command sets the desired peer backhaul radio MAC address to null and
also discards the associated backhaul radio MAC address, dis-associating any
existing link.
After discarding the peer MAC address, any remote backhaul radio
appropriately configured (with matching SSID, physical channel, and
complementary mode) can associate with the local backhaul radio. To prevent
this, set the peer MAC address with the desired remote backhaul radio’s
address as shown previously.
Example – Associated The following example shows a typical sequence of commands to force a
and Peer Backhaul backhaul radio association with a different remote node:
Radio MAC Addresses
Example
# Previous desired peer MAC address
/radio# show brm1 peer mac address
00:0d:67:00:11:6c
/radio# show brm1 associated mac address
00:0d:67:00:11:6c
# Break the existing association (backhaul link)
/radio# discard brm1 peer mac address
/radio# show brm1 peer mac address
00:00:00:00:00:00
/radio# show brm1 associated mac address
00:00:00:00:00:00
# A few seconds later, another BRM becomes associated
/radio# show brm1 associated mac address
00:0d:67:00:21:8f
# Accept the new associated BRM; copy the contents of its MAC
# address to the peer MAC address
/radio# accept brm1 associated mac address
/radio# show brm1 peer mac address
00:0d:67:00:21:8f
# Saves configuration (with new peer MAC address)
/radio# config-save
Wireless Security
This chapter describes how you can set up security to encrypt your wireless
transmissions so that your data cannot be deciphered if it is intercepted, and to
prevent access to the network by unauthorized clients. The following topics are
covered:
• “Configuring Security for Wireless Clients” on page 59
• “Configuring Security for Backhaul Links” on page 69
• “Controlling Inter-client Communication” on page 71
• “Detecting Rogue Access Points” on page 74
For full details on radio module security configuration, see the BelAir100 Radio
Command Line Interface Guide.
Configuring The BelAir100 has several options for wireless authentication and data
encryption. The method that you use depends on your security needs and your
Security for network configuration.
Wireless Clients If multiple SSIDs are configured, each SSID can be configured with its own
security options.
The authentication options are:
• instruct the Access Point to connect to a Remote Authentication Dial In
User Service (RADIUS) server in your network that keeps a list of accepted
clients. RADIUS is a standard for user authentication.
For this option, you need a RADIUS server. Multiple BelAir100 units can
share the information from the same RADIUS server.
• use a pre-shared key. This is a simpler authentication option, but more
difficult to maintain because pre-shared keys must be distributed to all
users.
You can also create a list of accepted clients; that is, an Access Control List
(ACL). This option is best suited for small networks.
The encryption options are:
• Wired Equivalent Privacy (WEP). This is a basic encryption scheme.
• Temporal Key Integrity Protocol (TKIP). This is an more advanced
encryption scheme.
• Advance Encryption Standard (AES). This is the strongest encryption
scheme.
Authentication Option
Encryption
Option Pre-shared key RADIUS 802.1X (EAP)
Note 1: The WPA2 encryption option is only available if your unit contains a
radio with part numbers B2CC011AA, B2CC011AB, B2CC043AA or
B2CC033AA. Use the /system/show phyinv command to display the
radio’s part number.
Note 2: Some configuration commands take longer than others to be applied
to a radio module. For example, it can take up to 40 seconds per SSID
for a WPA1 PSK configuration to be applied to an access radio. The
delay varies depending on the amount of computing resources
required to implement the configuration.
For small networks, you can use WEP or WPA1. For large networks, you can
use dot1x, WPA1 or WPA2 in combination with a RADIUS server. Because it
uses the TKIP mechanism for encryption, WPA1 provides much stronger
security than WEP or dot1x. WPA2 provides the strongest level of protection
because it uses the AES encryption.
CAUTION! dot1x, WPA1 or WPA2 can only be used with wireless clients that support
these standards (both the operating system and the network card). For clients
that only support WEP, select a combination with WEP.
Note: A network is as secure as its weakest link. If WEP is enabled, the overall
level of network security will be that of WEP.
To execute the commands described in this section, you must be in radio
mode.
Example 1
/# cd radio
/radio# show arm1 wep-encryption
wep psk key : <0x0102030405>
state : disabled
Example 2
/# cd radio
/radio# set arm1 wep-encryption psk 0x0123456789 enabled
Example 3
/# cd radio
/radio# set arm1 wep-encryption disabled
Managing RADIUS You can only use the 802.1X with RADIUS and the WPA1 with RADIUS access
Servers control methods when at least one RADIUS server is configured.
All access-request packets include the service type attribute which is set to a
value of 2.
RADIUS packets include a specific NAS port number representing the physical
port of the access radio.
Example 1
/# cd radio
/radio# add arm1 radius-server 172.16.1.20 1812
”radius-shared-secret” default
Example 2
/# cd radio
/radio# add arm1 radius-server 172.16.1.20 1812
”radius-shared-secret” interface 10.1.1.2
Example 3
/# cd radio
/radio# del arm1 radius-server 172.16.1.20 1812
Example 1
/# cd radio
/radio# show arm1 radius-reauth-time
Re-authorization time interval: 3600 seconds
Example 2
/# cd radio
/radio# set arm1 radius-reauth-time 3
Example 1
/# cd radio
/radio# show arm1 dot1x
dot1x wepkey : bits104
rekey method : no
state : disabled
Example 2
/# cd radio
/radio# set arm1 dot1x wepkey bits104 rekey kpackets 1000 enabled
Additional Considerations
If 802.1X is already enabled, entering the set dot1x command only changes the
specified parameter.
For instance, if you have entered the following command:
set arm1 dot1x wepkey bits104 rekey kpackets 1000 enabled
The following set dot1x command only changes the re-key method to once
every 100 seconds, without making any other changes.
set arm1 dot1x rekey seconds 100 enabled
Example
/# cd radio
/radio# show arm1 wpa1 ssidx 15
wpa1 authen : eap
wpa1 psk key : undef
rekey method : no
update : disabled
state : enabled
Additional Considerations
Make sure to set an access radio SSID other than the default before enabling
WPA1. The BelAir100 unit combines the password phrase with your network’s
SSID to create the WPA1 key.
If WPA1 is already enabled, entering the set wpa1 command only changes the
specified parameter.
For instance, if you have entered the following command:
set arm1 wpa1 eap rekey kpackets 1000 enabled
The following set wpa1 command only sets the update parameter to yes,
without making any other changes.
set arm1 wpa1 update yes enabled
• semicolon (;)
• question mark (?)
• double quotation mark (“)
You can also use WPA2 with a RADIUS server by specifying eap instead of a
pre-shared key. In this case, at least one RADIUS server must be
pre-configured.
The ssid_index parameter must be a valid SSID index. The default value is 1.
Example
/# cd radio
/radio# show arm1 wpa2
wpa2 authen : eap
wpa2 psk key : undef
state : enabled
Additional Considerations
Make sure to set an access radio SSID other than the default before enabling
WPA2. The BelAir100 unit combines the password phrase with your network’s
SSID to create the WPA2 key.
Wireless Client Access You should only use this option as an extra security measure if:
Control List
• you cannot or prefer not to set up a RADIUS server
• your network provides access to network clients which do not support
802.1X/WPA authentication
In both cases, it is recommended that you enable pre-shared key encryption
(WEP, WPA1 or WPA2).
show arm<n> acl [ssidx <ssid_index>]
add arm<n> acl mac-addr <mac-address> [ssidx <ssid_index>]
del arm<n> acl mac-addr <mac-address> [ssidx <ssid_index>]
set arm<n> acl {enabled|disabled} [ssidx <ssid_index>]
These commands let you manage the current access control list.
You can create a local list of clients (an ACL) that have access to the network.
All other clients are denied access. Clients are identified by the MAC address of
their network card. If you have multiple BelAir100 units in your network, you
need to create this list for every Access Point.
Typically, you enable ACL mode only after you have added all the desired MAC
addresses to the control list.
Note: This is a different list than the secure port mode access list.
CAUTION! When used with multiple SSIDs, this method affects wireless clients attempting
to associate with any of the SSIDs.
The ssid_index parameter must be a valid SSID index. The default value is 1.
Example
/# cd radio
/radio# add arm1 acl mac-addr 00:0D:87:00:11:22
Example 1
/# cd radio
/radio# show brm1 mac auth-response-time-out
500
Example 2
/# cd radio
/radio# set brm1 mac auth-response-time-out 3000
Configuring This section describes how to configure wireless encryption for the various
types of backhaul links
Security for
Backhaul Links The commands that you use depend on the type of radio that you have. Use
the /system/show phyinv command to display the radio’s part number.
The pre-shared key must be exactly 32 bytes long (16 characters). The
pre-shared key can be specified as a hexadecimal or ASCII string and must not
contain the following characters:
• exclamation mark (!)
• bar (|)
• semicolon (;)
• question mark (?)
• double quotation mark (“)
Example
set brm1 link privacy enabled key 123456789qwertyu
Example
/# cd radio
/radio# set brm1 key WEP,abcdefg012345
Example 1
/# cd radio
/radio# show brm1 privacy status
enabled
Example 2
/# cd radio
/radio# set brm1 privacy enabled
Example 1
/# cd radio
/radio# show arm1 wireless-bridge
enabled
Example 2
/# cd radio
/radio# set arm1 wireless-bridge disabled
Disabling Inter-AP Disabling inter-AP wireless client communications involves setting up an access
Wireless Client radio white list and secure port mode for each access radio.
Communication
Managing the Access Radio White List
show arm<n> secure-mac-addresses [ssidx <ssid_index>]
add arm<n> secure-mac-address <mac address> [ssidx <ssid_index>]
del arm<n> secure-mac-address <mac address> [ssidx <ssid_index>]
These commands let you manage an access radio’s white list.
The [ssidx <ssid_index>] parameter applies only if your unit contains a radio
with part numbers B2CC011AA, B2CC011AB, B2CC043AA or B2CC033AA.
(Use the /system/show phyinv command to display the radio’s part number.)
The ssid_index parameter must be a valid SSID index. The default value is 1.
When configured in secure port mode, the access radio forwards to the
associated wireless clients only those Layer 2 (Ethernet) frames for which the
source MAC address matches one of the MAC addresses in its white list. The
white list can contain up to 32 MAC addresses.
In effect, while in this mode the access radio acts as a firewall for all Layer 2
frames arriving from inside the network for the wireless clients. The access
radio white list should only contain the MAC addresses of the gateway
interfaces. Thus, wireless clients associated to other access radios in the
network are prevented from communicating with locally associated clients.
Note: The white list is different from the access control list for wireless
clients. An access control list lets only certain wireless clients associate
with an access radio. The white list controls data forwarding to the
wireless clients from remote entities in the network.
The content of the white list takes effect only when the access radio secure
port mode is enabled.
Example
/# cd radio
/radio# add arm1 secure-mac-address 00:0d:c7:a0:11:23
Example 1
/# cd radio
/radio# show arm1 secure-port
disabled
Example 2
/# cd radio
/radio# set arm1 secure-port enabled
Detecting Rogue Rogue access points may be installed on a corporate network by employees
using low-cost equipment they purchased themselves. The rogue access points
Access Points are often installed inside the corporate firewall with even the most basic
security settings disabled, thus creating the potential for network security
breaches. A rogue device may also be connected to a totally separate wired
network that happens to be near corporate facilities but is still accessible to
client devices within the enterprise.
For public networks, numerous Wi-Fi networks may exist “underneath” the
public network, being in or near the coverage area.
In some cases, a rogue access point may present a security concern. In all cases,
rogue access points are a source of interference and capacity degradation for
the network being deployed.
The following commands assist you in detecting unauthorized “rogue” wireless
access points:
show arm<n> rogue-ap
show brm<n> rf_survey
These commands display several information items for every access point
“visible” to a BelAir100’s radio using a particular channel. The displayed
information can help you identify and locate rogue access points. The displayed
information includes the following information about the detected access
points:
• the access point’s MAC address
• the channel number it is using
• its SSID
• the Remote Signal Strength Indication (RSSI) of the link in dBm
• the age of the association (number of seconds since last signal was received
from the MAC address)
• the BSS configuration type, either infra (for infrastructure) or adhoc
• whether privacy is enabled or not
Note: This command may not detect rogue access points that use a channel
that is different than the radio’s channel. You can choose to change the
radio’s channel and repeat this command to detect all possible rogue
access points. However, changing a radio’s channel is service affecting
and could disrupt client access. See “Channel Number” on page 37 for
the command to changing a radio’s channel.
Example
cd /radio
/radio# show arm1 rogue-ap
MAC CH RSSI(dBm) AGE(s) BSSTYPE PRIVACY SSID
------------------ -- --------- ------ ------- ------- ----------
00:0d:67:00:03:e1 1 -61 2 infra yes abc_ltd
00:0d:67:00:02:fe 4 -52 3 infra yes abc_ltd
00:07:85:B3:73:94 6 -90 11 infra no tsunami
00:0d:67:00:00:93 8 -65 0 infra yes abc_ltd
01:0d:67:00:01:21 11 -45 0 infra yes abc_ltd
In the previous example, four of the devices visible to the access radio have
SSIDs abc_ltd indicating the network being deployed with BelAir equipment. A
fifth device has an SSID tsunami, indicating a potential rogue access point. By
examining the MAC address, you can interpret that the rogue is a Cisco access
point. The rogue is transmitting on (the usual default) channel 6 with no
encryption and has a fairly low RSSI. This rogue is located within the field of
view of the BelAir100 that is performing the rogue query. The rogue likely
interferes most with the BelAir nodes for ABC Ltd deployed on channels 4
and 8.
CAUTION! Before using this command on a BelAir100, you must configure the BelAir200
VLAN subsystems with the same VLAN ID as specified by this command. Refer
to the BelAir200 User Guide for instructions on configuring VLAN subsystems.
All traffic from the specified client is discarded by the BelAir200 if the mapped
VLAN is not previously configured.
The normal, broadcast or suppressed setting applies only to SSID 1. SSIDs 2 to
16 can only be suppressed.
Note: Configuring multiple normal or broadcast SSIDs increases the number
of beacon data frames sent by the unit.
For all access radios except those with part numbers B2CC000AA or
B2CC000AB:
• The normal setting is the default for SSID 1. The normal SSID type is the
same as broadcast.
• A broadcast setting means that the access radio does respond to a
broadcast probe request and that SSID information element is present in the
beacon dataframe.
Note: Because normal and broadcast are considered the same, any display
of the SSID type shows normal.
• A suppress setting means that the access radio does not respond to a
broadcast probe request and that SSID information element is present in the
beacon dataframe, but has a length of 0 and a null value.
If you have a radio with part number B2CC000AA or B2CC000AB:
• The normal setting is the default for SSID1 and means the SSID type is
neither suppressed nor broadcast.
• A broadcast setting means that the access radio does respond to a
broadcast probe request and that SSID information element is present in the
beacon dataframe, but has a length of 0 and a null value.
• A suppress setting means that the access radio does not respond to a
broadcast probe request and that the SSID information element is removed
from the beacon dataframe.
Note 1: The set arm<n> ssid <ssid_string> command sets the value of SSID 1
without mapping it to a VLAN.
Note 2: After you set or change an SSID for the access radio, BelAir Networks
recommends that you save your configuration and reboot it. Rebooting
the access radio will disrupt access traffic for approximately
20 seconds.
of Associated This command displays the list of associated wireless clients for a given SSID. If
no SSID is specified, the displayed list shows all associated clients and their
Clients for a SSID.
Given Access
The ssid_index parameter must be a valid SSID index. The default value is 1.
Radio SSID
Table 8 explains the various fields in the resultant output.
Field Description
Field Description
dhcp Client DHCP state (applicable only if client uses dynamic IP addressing)
init Client has just connected and has not yet started a DHCP
sequence
disc Client has sent a DHCP Discover message and is waiting for a
DHCP Offer message to get its IP address.
(Applicable only if client does not already have a valid IP address.
Otherwise client sends DHCP Request message.)
req Client has sent the DHCP Request message to the server and is
waiting for a a DHCP Ack message to confirm the assigned IP
address.
decl Server has declined the client’s DHCP request. Verify the server
settings.
ack Client has sent a DHCP Request message and the server has
confirmed the assigned IP address.
(Considered a DHCP complete state.)
nack Server has responded to the client’s DHCP request with a DHCP
Nack message. Verify the server settings.
arpRes Client has gone through one of the DHCP state transitions and
replied to an ARP request for its IP address.
(Considered a DHCP complete state.)
Example
/# cd radio
/radio# show arm1 client associated
Total associated clients : 2
BelAir100 Layer 2 The following command displays the port assignment and status of the layer 2
switch:
Switch Port
Assignment show interface config all
Example
/# show interface config all
Index Name Module IfaceType MTU AdminStat OperStat EncapType
----------------------------------------------------------------------------
Physical:
----------------------------------------------------------------------------
1 eth0 ARM 802.11 1500 Up Up Ethernet V2
2 eth1 BRM1 802.11 1500 Up Up Ethernet V2
5 eth4 LIM ENET 1500 Up Up Ethernet V2
----------------------------------------------------------------------------
Logical:
----------------------------------------------------------------------------
9 default Logical L3IPVLAN 1500 Up Up Ethernet V2
10 vlan44 Logical L3IPVLAN 1500 Up Up Ethernet V2
11 vlan4 Logical L3IPVLAN 1500 Up Up Ethernet V2
Note that the logical interface named default corresponds to the unit
management interface. Typically, you should never disable this interface.
Using Layer 2 The BelAir100 behaves as a layer 2 switch and transparent bridge where the
traffic from any port can be switched to any other port.
Bridging
Using Virtual A virtual LAN (VLAN) refers to a group of devices that communicate with each
other as if they were on the same physical LAN. VLANs have the following
LANs benefits:
• You can control traffic by excluding broadcast traffic from the VLAN, and
including only those devices that must communicate with each other
• You can provide security by forcing traffic between VLANs through a routing
device.
For the BelAir100, an unlimited number of VLANs can be created for client
traffic. Up to four management VLANs can be configured. VLANs can be
implemented based on client SSID, as described in “Managing Access Radio
SSIDs” on page 76.
CAUTION! Before assigning client SSID traffic to a VLAN on a BelAir100, you must
configure a BelAir200 VLAN subsystem with the same VLAN ID as specified on
the BelAir100. All traffic from the specified client is discarded by the BelAir200
if the mapped VLAN is not previously configured.
Data packets from the client are tagged for the appropriate VLAN by the access
radio. If the client traffic is bridged to a port with a backhaul radio that sends
the traffic to a BelAir200, then the BelAir200 segregates the traffic onto the
appropriate VLAN based on the tag. If the client traffic is bridged to the LPM
port, then the LPM sends the traffic onto the Ethernet connection without
removing the tag. This is different than the case of the BelAir200, where you
can choose to have the tag removed before the traffic is sent onto the Ethernet
connection.
Configuring the IP You can set the IP address associated with a VLAN with the following
Address of a VLAN commands:
cd /ip
/ip# ip config set <ip address> netmask <subnet mask> vlan <1-2815>
or
cd /ip
/ip# ip config dynamic vlan <1-2815>
The ip config set command configures a static IP address. If you use the ip config
dynamic command, a Dynamic Host Configuration Protocol (DHCP) server
provides the IP address. If the specified VLAN does not previously exist, then it
is created.
CAUTION! If you create a new VLAN with this command, then, you must configure a
BelAir200 VLAN subsystem with the same VLAN ID as specified on the
BelAir100. All traffic from the specified client is discarded by the BelAir200 if
the mapped VLAN is not previously configured.
Note: DHCP servers usually have the ability to assign a default route to
DHCP clients. BelAir Networks recommends that you configure your
DHCP server to not supply any default routes. This avoids the
possibility of the DHCP server providing two different default routes to
two different IP interfaces on the same BelAir platform (for example, a
management IP interface and a VLAN IP interface). To configure a
default route, use instead the ip route add command available while in
ip mode.
If you use a DHCP server, you can use the following command to renew the IP
address:
cd /ip
/ip# ip config vlan <1-2815> renew-ip
You can remove a previously created VLAN with the following command:
cd /ip
/ip# ip config del vlan <1-2815>
You can display the current VLAN IP settings with the following command:
cd /
/# show ip config [vlan <1-2815>]
If you do not specify a VLAN, then information is displayed about all VLANs.
Example
cd /
/# show ip config
Managing Egress In a BelAir network, the LPM port of a node can act as an egress point for the
backhaul traffic of many other nodes. The other nodes may be connected to
Node Traffic the egress node through point-to-point, point-to-multipoint or
multipoint-to-multipoint links.
These commands let you manage list of VLAN IDs. By default, the list is empty
meaning that all traffic is allowed to enter or leave the LPM port of the egress
node. If you add a VLAN ID to the list, then only traffic belonging to that VLAN
can enter or leave the LPLM port of the egress node. If you add the keyword
untagged to the list, then only untagged traffic can enter or leave the LPLM port
of the egress node.
The TEP strips off the encapsulation data to reveal the original Ethernet frame
exactly as sent by the AP. The TEP delivers the Ethernet frame to a
VLAN-aware Ethernet switch. The switch applies normal Ethernet forwarding
rules to send it to a gateway router with one router port per subnet. The
gateway router switches the Ethernet frame to the appropriate outgoing router
port.
For packets moving in the other direction to the wireless client, the gateway
router applies to IP traffic an Ethernet header with the client’s MAC address as
the destination. The VLAN switch forwards this packet to the interface on
which it last saw the client’s MAC address, which is the interface connected to
the tunnel. The TEP receives the frame and encapsulates it in an IP packet.
When the AP receives the packet it strips off the encapsulation data, converts
the resulting Ethernet frame to an 802.11frame, and then transmits it to the
wireless client.
When a mobile wireless client moves to a new AP, its traffic travels through a
different Layer 2 tunnel. The traffic is encapsulated and sent to TEP as before.
The VLAN-aware Ethernet switch then updates its MAC address table as
required with the information for the wireless client’s new AP. Any subsequent
frames sent to the wireless client are then forwarded to the new AP.
Each BelAir AP can have up to five tunnels to one or more TEPs. The end
points of a layer 2 tunnel are identified by their IP addresses. The IP address of
the BelAir tunnel end point can be the IP address of the unit’s management
interface, or any IP address associated with a VLAN. The BelAir IP addresses
can be set manually or through the Dynamic Host Configuration Protocol
(DHCP).
Each tunnel can carry traffic belonging to any group of configured VLANs.
1 10.1.1.2 bridge2 UP
2 10.1.1.2 bridge1 UP
VLAN map: 1500
3 N/C
4 N/C
5 N/C
create multiple tunnels to the same peer or to different peers. Each tunnel
carries just one L2TP session.
The <index> parameter is used for easy reference when using other
commands. It can be displayed with the show tunnels command.
The <stn_name> parameter can be any series of 18 alphanumeric ASCII
characters. L2TP protocol provides the <stn_name> parameter to the other
end point so it can identify different tunnels coming from the same IP address.
The tunnel del command removes the specified tunnel. After using this
command, user data mapped to this tunnel is dropped instead of forwarded.
Configuring the The specific configuration tasks and commands for the network central router
vary, depending on the type of router that is installed.
Network Central
Router for Refer to the Tunnel Mobility Application Note, available at
www.support.belairnetworks.com for guidance on configuring the Cisco 7200
Layer 2 Tunneling router.
Prioritization Each BelAir node supports four traffic priority queues, numbered 0 to 3.
Queue 3 has the highest priority while queue 0 has the lowest priority. Table 9
describes each queue.
Queue
Description
Number
0 Background traffic
1 Best effort traffic
Use this queue for traffic that does not require QoS features,
such as most data traffic
2 Video traffic
Use this queue for high priority traffic such as video or “gold
service” customer traffic
All traffic that is not associated to a VLAN has priority 1. This means that until
you create VLANs, all traffic has priority 1.
Once VLANs have been created, you configure the node traffic to have different
priorities based on User Priority bits (0 to 7) or VLAN IDs.
0 1
1 0
2 0
3 1
4 2
5 2
6 3
7 3
To unmap a previously set priority, use the map up command to map that
priority back to the default priority queue as shown in Table 10.
The map vlan command instructs the BelAir100 to process packets from the
specified VLAN to the specified priority queue. The no map vlan id command
removes a VLAN ID to priority map.
Note: Settings made with this command have precedence over settings made
with the map up command.
These commands apply only if your unit contains a radio with part numbers
B2CC011AA, B2CC011AB, B2CC043AA or B2CC033AA. (Use the /system/
show phyinv command to display the radio’s part number.)
The show command displays the current QoS mapping setting.
The set command let you decide how traffic is processed to the four BelAir
priority queues depending on the values of the User Priority (UP) field or the
Differentiated Services Code Point (DSCP) field in the client traffic fields.
Selecting up means that traffic is sent to the four BelAir priority queues based
on the UP field value. Selecting dscp means that traffic is sent to the four BelAir
priority queues based on the DSCP field value. Selecting both means that traffic
is sent to the four BelAir priority queues based on the highest priority value of
either the UP field or the DSCP field. By default, QoS mapping is set to both.
Table 11 shows the mapping of the UP value and the DSCP value to the priority
queue.
Table 11: UP and DSCP Value to Priority Queue Processing
0 0 (0x0) 1
1 32 (0x20) 0
2 64 (0x40) 0
3 96 (0x60) 1
4 128 (0x80) 2
5 160 (0xA0) 2
6 192 (0xC0) 3
7 224 (0xE0) 3
Example
cd /qos
/qos# show qos config
Example
cd /qos
/qos# show vlan id 100 qos config
Example
cd /qos
/qos# show qos user priority map
Qos Global UP to Queue Mapping
---------------------------------
UP Value : 0 -- Queue : 0
UP Value : 1 -- Queue : 1
UP Value : 2 -- Queue : 1
UP Value : 3 -- Queue : 1
UP Value : 4 -- Queue : 1
UP Value : 5 -- Queue : 1
UP Value : 6 -- Queue : 2
UP Value : 7 -- Queue : 3
BelAir100 Statistics
The BelAir100 collects a large number of statistical information which can help
you determine the state of your wireless network, as well as pinpoint any
potential source of troubles (as, for instance, congested links or repeated
attempts to gain unauthorized access to the network).
This section summarizes BelAir100 radio statistics. For further details, refer to
the BelAir100 Radio Command Line Interface Guide.
Radio Statistics
Wireless show {arm<n>|brm<n>} mac statistics
Communication This command displays the MAC statistics of a backhaul radio or an access
Statistics
radio.
Example
/# cd radio
/radio# show arm1 mac statistics
transmit fragment count : 627
multicast transmit fragment count : 203
failed count : 1552
retry count : 0
multiple retry count : 424
frame duplicate count : 0
rts success count : 0
rts failure count : 0
ack failure count : 1552
received fragment count : 0
multicast received fragment count : 0
fcs error count : 762
transmit frame count : 424
received frame count : 0
wep undecryptable count : 0
Example
/# cd radio
/radio# show arm1 privacy statistics
xmit rejected : 0
plain rejected : 0
encrypted rejected : 0
nokey rejected : 0
Upgrade Process An operator logged in as root can upgrade a BelAir100 unit by downloading a
new software load from a remote server. You can use either TFTP or FTP to
Overview communicate with the remote server. You must ensure that the server is
running at an accessible IP address. For redundancy purposes, BelAir100 units
store two copies of the software load in two application banks: banks A and B.
The active software load is the software load that is currently running. The
standby software load is the software load in the alternate application bank.
Either bank A or bank B may be active at a given time. See Figure 6 on page 99.
BelAir Unit
Active
Software Load
Pointer to software
load for next restart
A B
Active Standby
Software Load Software Load
Under normal operating conditions, the contents of the two software load
banks are identical. During a software upgrade, the new software load is copied
into the standby bank at the time of the upgrade.
A software upgrade consists of the following steps:
1 Ensure the current configuration is saved. Refer to “Saving and Restoring the
BelAir100 Configuration” on page 29.
2 Determine what software load is active (A or B). The new software load will
overwrite the standby bank.
3 Download the new software load. The new software load is downloaded to
the standby software load bank. If A is active, then the new software load is
downloaded to bank B. If B is active, then the new software load is
downloaded to bank A.
4 Verify the new software downloaded successfully.
5 Activate the new software load from the standby software load bank
(containing the new load) by rebooting the node. The new load is promoted
to active and the formerly active software load bank becomes standby.
6 Verify the configuration and operation of the unit operating with the new
software load
7 Commit the load (copy the newly activated load to the standby software
load bank).
Note: Any configuration changes that you make before you commit the new
software load are lost if you back out of the upgrade.
CAUTION! Do not change or save the node configuration while upgrading the system.
CAUTION! It is always possible to downgrade a committed software load to an older
release. However, while the existing configuration data is saved (upgraded)
during a software upgrade, the existing configuration data could be lost (erased)
during a software downgrade. BelAir Networks recommends that you save and
remotely store the current existing configuration database in case you choose
to downgrade a software load. For instructions on how to downgrade a unit,
contact BelAir Networks.
Displaying the The active software load can be displayed with the following command:
Active and Next cd /system
show active load
Software Loads The software load that is activated at the next reboot can be displayed with the
following command:
cd /system
show next load
Downloading a You can download a new software image from a remote server with the
following command:
New Software
Load cd /system
upgrade load remoteip <serverIPaddress>
remotepath <serverSubDir>
[{tftp|ftp [user <usrname> password <pword>]}]]
Note: This command is only available if you are logged in as root.
The command copies the new software load into the standby software load
bank and sets the new load as the next active load. See Figure 7.
By default, the upgrade load command uses TFTP. If you specify FTP, you can
also specify the user name and password. The default FTP user name is
anonymous and the default FTP password is root@<nodeip>, where
<nodeip> is the IP address of node making the request. If you do not use the
default FTP username, the FTP server must be configured to accept your
username and password.
CAUTION! Once it begins, the upgrade process cannot be interrupted or terminated by the
user with the current CLI session. See “Canceling a Software Upgrade” on
page 101.
BelAir Unit
Active
Software Load
Pointer to software
load for next restart
External
TFTP
A B Server
Software
Active Standby Download
Software Load Software Load
Verifying a Verify that the new software downloaded successfully with the following
command:
Successful
Download cd /system
show loads
If there are any issues with the downloaded software, perform the download
again.
Note: All software prior to Release 3.2 does not recognize the load ID tags
for software subsequent to Release 4.0. This means that if you upgrade
from Release 3.2 (or earlier software) to Release 4.0 (or later
software), the show loads command does not return results for the
new load until you activate the new load with the reboot command.
Once you activate the new load, the show loads command displays
results for both the new and old software loads.
Activating a To activate a software load, reboot the system, with the reboot command. The
reboot command is only available if you are logged in as root.
Software Load
This command forces the unit to execute with the new load and completes the
activation process.
Note: Rebooting a unit as part of a software upgrade can take significantly
longer, up to 20 minutes, depending on the unit’s configuration.
Verifying the New BelAir Networks recommends that you fully verify the configuration and
operation of an upgraded unit before you commit the new load. Use the
Software Load following steps as guidelines.
1 Fully verify the unit’s configuration and operation.
2 If required, adjust any settings and save the new configuration.
3 Reboot the unit and verify that all changes take effect.
If you observe any issues, follow the steps in “Backing Out from a Software
Upgrade” on page 103.
Committing a Once you have activated the unit with new software load, you can commit it
with the following command:
New Software
Load cd /system
commit load
been committed. After the new software load has been committed, you can no
longer back out of the upgrade; but you can downgrade the unit. For
instructions on how to downgrade a unit, contact BelAir Networks.
Figure 8: Software Upgrade Step 7 - Commit the Software Load
BelAir Unit
Active
Software Load
Pointer to software
load for next restart
A B
Standby Active
Software Load Software Load
The commit command copies the system software and the configuration
database to the adjacent bank at the time of execution. However, changes to
the active load’s configuration after the commit command is executed are not
automatically stored in the standby bank. To keep both banks synchronized, you
must use the commit command after every configuration change of the active
load.
Backing Out from It is possible to back out from a software upgrade in case its effects are
undesired, but only if the new software load has not been committed. See
a Software Figure 9 on page 104.
Upgrade
BelAir Unit
Active
Software Load
Pointer to software
load for next restart
Activate old
software load
A B
Old New
Software Load Software Load
When you back out of a software upgrade, the old load overwrites the new
software load.
Note: The commands described in this procedure are only available if you are
logged in as root.
To back out from an upgrade, do the following steps:
1 Determine which bank has the old software load with the following
command:
cd /system
show loads
2 Set the old software load to be the next active load with the following
command:
cd /system
set next load {A|B}
If you have just upgraded the software, you must set the unit to reboot with
the currently standby load. For example, if the old software load is in
bank A, as shown inFigure 9, and the new software load is in bank B, then
you must activate bank A with the following command:
set next load A
Displaying the The status of the software upgrade process can be displayed with the following
command:
Status of the
Software Upgrade cd /system
show upgrade status
BRM1
Mode: Client
MAC address:
BA100-A
172.16.100.3
00:0d:67:00:0B:01
BA200-B
172.16.100.2
BRM2 BRM1
Mode: AP Mode: Client
MAC address: MAC address: Configuration
00:0d:67:00:0B:02 00:0d:67:00:0C:01 Terminal
To configure the network, you first need to configure the IP parameters for
each BelAir200 unit and the BelAir100 unit, as described in section
“Configuration of IP Parameters” on page 107. At this stage, you should also
determine the MAC addresses of the backhaul radios. You will need this piece
of information to configure the backhaul radio links.
The next step is to configure each unit’s country of operation, which in this
case is Canada. Then, you must configure the radio modules and finally, for the
BelAir200 units in the network, the layer 2 networking. After these latter steps,
the network is ready to carry traffic.
Configuration of As shown in Figure 10, all units are assigned static IP addresses, namely
172.16.100.1 for BA200-A, 172.16.100.2 for BA200-B and 172.16.1.3 for
IP Parameters BA100-A.
Start a secure CLI session to BA200-A, using the default IP address (10.1.1.10).
Login as root, and change the default root password, using the passwd
command.
Note: The specified password is case sensitive and must be at least six
characters long.
Determine the MAC address of the radio modules:
/radio/show brm1 mac-address
00:0d:67:00:0A:01
If two client mode backhaul radios attempt to associate with the same AP
mode backhaul radio, you can tell which is the desired one based on the
received remote-end MAC address.
Lastly, change the IP settings; that is, the IP address and the static routing tables,
if needed:
cd /system
system default-ipaddr 172.16.100.1 subnet-mask 255.255.255.0
You must execute similar procedures for each of the other units: BA200-B and
BA100-A.
Configuring the After rebooting, login again to each unit, using the new root password.
Remaining Execute the configuration commands listed in the following subsections. There
Parameters is one subsection for each unit in the network. The commands configure the
backhaul radio links using channels 53 and 61.
It is essential that the radio module pair (client and AP mode) at the two ends
of a backhaul link be configured with the same SSID and with the same security
and privacy parameters.
Configuring different backhaul links with unique SSIDs prevents undesired
associations and potential connectivity problems. Refer to the BelAir Products
Deployment Guidelines for more details.
Additional Backhaul Once the backhaul links become operational, you can configure Associated and
Configuration Options Peer backhaul radio MAC address functions as an additional measure to control
which nodes establish backhaul links. Refer to “Associated and Peer Backhaul
Radio MAC Addresses ” on page 56.
Getting Started
Table 12: More Information — Getting Started
Working Out
Table 13: More Information — Working Out Details
Details
When you are: Use these documents:
Technical Support
This section provides direction should you have questions about your
BelAir100 unit.
Support In general, BelAir Networks recommends that you do the following steps to
seek the information you want:
Resources
1 If this document has a troubleshooting section, refer to it and to the
troubleshooting section in the User Guide to see if it describes your
situation. If it does, do the provided corrective actions.
2 If the troubleshooting section does not cover your situation, contact your
BelAir Networks product representative
3 If you still need assistance, use the BelAir Networks online support center
at www.support.belairnetworks.com
4 Finally, if your issue is not resolved, contact BelAir Networks:
—613-254-7070
—1-877-BelAir1 (235-2471)
—[email protected]
Warranty and To review BelAir’s product warranty, refer to the chapter called “Warranty and
Limitations” in the Installation Guide.
Limitations
Troubleshooting The BelAir100 provides the following tools to determine the source of your
network problems:
• the alarm and event reporting subsystem (see “Alarm and Event Reporting”
on page 113 and “Alarm Definitions” on page 117)
• SNMP traps, that are created for some events (see the BelAir100 System
Command Line Interface Guide)
• statistics information available while in radio mode
• the SYSLOG subsystem (see “Using SYSLOG” on page 121)
Alarm and Event The BelAir100 alarm and event reporting subsystem monitors both active
alarms and alarm history. Active alarms are stored in system memory and are
Reporting
not persistent. The BelAir100 maintains the history of the last 10 000 reported
alarms. The alarm history is persistent during normal operation.
The alarm and event subsystem is accessible in system mode, where you can:
• display active alarms, filtered by alarm type and severity level
• display the alarm history, filtered by alarm type and severity level
• determine which alarm types and alarm severities generate SYSLOG and
SNMP trap notifications
Alarm Types and Table 15 shows the types of alarms that the BelAir100 can generate.
Severity
Table 15: BelAir100 Alarm Types
Type Description
The BelAir100 can produce alarms with the following severity: critical, major,
minor, warning and information.
Example
In the following example, only one alarm is displayed because only one alarm
was active at the time the command was issued.
/# system/show alarms 20
Displaying 1 active alarms of 1 total:
Id Date/Time (UTC) Severity Status Ignored Entity Type Description
----------------------------------------------------------------------------------------------
0 2004-11-05 19:16:06 critical Set No brm1 dcom Link Down
displayed alarm and re-issue the show alarm history command with the
appropriate <log_idx> parameter. See the following examples.
Example 1
The following example displays the five most recent alarms.
/# system/show alarm history 5
Displaying 5 alarm history entries:
Id Date/Time (UTC) Severity Status Ignored Entity Type Description
------------------------------------------------------------------------------------------------
9 2006-01-23 19:40:43 minor Clr No scm eqpt SNTP server not available
8 2006-01-23 19:39:20 critical Clr No brm3 dcom Link Down
7 2006-01-23 19:39:06 critical Set No brm3 dcom Link Down
6 2006-01-23 19:38:00 critical Clr No brm2 dcom Link Down
5 2006-01-23 19:37:45 critical Set No brm2 dcom Link Down
Example 2
The following example displays the next two most recent alarms.
/# system/show alarm history 2 type all severity all 4
Displaying 5 alarm history entries:
Id Date/Time (UTC) Severity Status Ignored Entity Type Description
------------------------------------------------------------------------------------------------
4 2006-01-23 19:36:54 minor Set No scm eqpt SNTP server not available
3 2006-01-23 19:36:29 warning Set No brm3 eqpt Battery missing
Example 3
In the following example, only two alarms are displayed because only two
alarms were active at the time the command was issued.
/# system/show alarm history 20
Displaying 2 alarm history entries:
Id Date/Time (UTC) Severity Status Ignored Entity Type Description
----------------------------------------------------------------------------------------------
1 2004-11-08 14:04:43 critical Set No brm3 dcom Link Down
0 2004-11-05 19:16:06 critical Set No brm1 dcom Link Down
Specifying a value in the mask enables notifications for that type. Mask
specifications can have multiple values separated by a vertical bar. For example,
specifying mask dcom|eqpt|env means that all data communications,
equipment and environment alarms generate SYSLOG and SNMP trap
notifications, provided they are not blocked by the alarm severity mask.
Example
/# system/show alarm mask
Alarm masks (enabled if set)
Alarm Notification type mask: dcom(1), eqpt(1), sw(1), qos(1), env(1), secu(1), sys(1)
Alarm severity mask: critical(1), major(1), minor(1), warning(1), info(1)
Alarm Definitions Table 16 describes the alarms that are displayed by the BelAir user interface.
Id Alarm Description
Id Alarm Description
Id Alarm Description
Id Alarm Description
Id Alarm Description
Using SYSLOG In addition to the alarm subsystem, the BelAir100 can generate other event
notifications. With the System Log (SYSLOG) functions you can:
• send the event notifications to a remote server
• have them displayed on a CLI session as they occur
• filter the severity of the events that are logged
For full details on the SYSLOG functions, see the BelAir100 System Command
Line Interface Guide.
Example
/# show syslog config
Example
/#cd syslog
/syslog# logserver 10.6.4.52
Example
/#cd syslog
/syslog# monitor logging enable
This command restricts logging to messages at the specified level and below (in
the sequence of appearance in the command).
Note: The SYSLOG message severity levels are separate and distinct from the
alarm severity levels.
Example
/#cd syslog
/syslog# loglevel error
In the preceding example, after the command is issued, the unit generates
error, critical, alert and emerg messages.
Example
/#cd syslog
/syslog# logging enable
Access Radio
. . . . . . .
. . . . . . .
. . . . . . .
Backhaul Radio
BRM1 (if equipped) SSID: ____________________________ Phys. Ch#__________
Key Id Type (Wep or TKIP) Key Value (5 or 13 ASCII characters if WEP, or 16 ASCII characters if TKIP)
1 ____________________ _____________________________________________________________________
1 ____________________ _____________________________________________________________________
Resetting a You can reset the configuration of a BelAir100 to the factory default settings by
using a CLI command or a Reset Dongle. See Figure 11 on page 130.
BelAir100
Configuration to Typically, you would perform this procedure only when all other methods of
changing the unit’s configuration have failed. The Reset Dongle is used when
Factory Defaults there is no way of communicating to the unit.
Resetting to Factory If you are logged in as root and have access to system commands, you can reset
Defaults with a CLI the unit to the factory defaults.
Command
CAUTION! By performing the following procedure, all local configuration data will be
replaced by default factory settings. You will not be able to recover any local
configuration data.
CAUTION! You may not able to reestablish connectivity to a remotely located unit after you
execute this procedure.
Use the following command sequence:
cd /system
syscmd restoreDefaultConfig
reboot
Resetting to Factory Figure 11 on page 130 shows a Reset Dongle. It is provided with every
Defaults with a Reset BelAir100 unit that is shipped from the factory.
Dongle
3 Plug the Reset Dongle into the unit battery connector jack. See Figure 13.
Figure 13: Installing a Reset Dongle
4 Wait until the power indicator LED turns from green to amber, indicating
that the unit is rebooting. Once the LED turns amber, remove the Reset
Dongle.
The default factory default configuration is activated after the reboot.
5 Re-install the cover removed in step 2 using the appropriate screws.
Factory Defaults The following sections describe the default factory settings for a BelAir100 unit.
Settings
Default Node
Configuration Table 17: Default OAM IP Addressing
Parameter Setting
Parameter Setting
country us
Parameter Setting
Parameter Setting
Parameter Setting
Parameter Setting
channel 11
mesh identifier BelAirNetworks
privacy disabled
encryption key 0x00000000000000000000000000000000
mesh point type multipoint
mesh portal no
traffic limit disabled
Parameter Setting
Parameter Setting
Parameter Setting
mode disabled
physical channel number
BRM1(if equipped) 54 (prim. channel), 0 (sec. channel)
BRM2 (if equipped) 66 (prim. channel), 0 (sec. channel)
SSID
BRM1(if equipped) BelAir Backhaul Radio 1
BRM2 (if equipped) BelAir Backhaul Radio 2
privacy disabled (no encryption)
antenna selection external
peer MAC provisioned 00:00:00:00:00:00
link distance 1 km
TPC admin state disabled
DFS disabled
communications enabled
Parameter Setting
beacon period 100 milliseconds
RTS threshold 2347
fragmentation threshold 2346
short retries 8
long retries 4
authentication response timeout 500 milliseconds
association response timeout 500 milliseconds
1 WEP 1234567890123
Parameter Setting
Parameter Setting
bridging enabled
VLANs
default VLAN for untagged traffic ID 1
no other VLAN tags are configured
Required You need a no. 2 Phillips screwdriver to access the unit’s connectors.
Equipment If your unit is equipped with an electrical Ethernet interface, you need a
cross-connect RJ45 Ethernet cable. If your unit is equipped with an optical
Ethernet interface, you need:
• a media converter; such as the McBasic TX/FX from IMC Networks
• a single mode fiber cable with dual-LC connector at one end and a
connector at the other end suitable for your media converter
Refer to Figure 14.
Figure 14: Typical Required Equipment for an Optical Ethernet interface
AC Power Ethernet
Connector Connector
Battery
Connector
2 Carefully remove the protective cover from the unit’s Ethernet port.
3 Make the Ethernet connection.
If your unit has an electrical Ethernet interface, plug one end of the RJ45
Ethernet cable into the BelAir100’s Ethernet port and the other end into
your configuration terminal.
If your unit has an optical Ethernet interface refer to Figure 16 and do the
following sub-steps:
a Carefully remove all caps and dust covers protecting the ends of the dual
LC connector on the optical cable.
b Remove the cover protecting BelAir100 optical Ethernet port.
c Remove the dust protector on the BelAir100 dual LC connector.
d To avoid an electrostatic discharge while connecting the optical cable,
touch the metal base of the unit.
e Carefully insert the optical cable’s dual LC connector into the BelAir100’s
optical Ethernet port.
f Connect the other end of the optical cable to the media converter.
g Connect your configuration terminal to the media converter.
Figure 16: Connection Setup for BelAir100 with an Optical Ethernet Interface
Media
Converter
BelAir100
Configuration
Terminal
User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
User Privilege Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Adding User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Deleting User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Modifying User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Displaying the Available User Accounts . . . . . . . . . . . . . . . . . . . . . . . .21
System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Displaying the BelAir100 Node and IP Parameters . . . . . . . . . . . . . . .25
Configuring the BelAir100 System Parameters . . . . . . . . . . . . . . . . . .25
Configuring the System IP Parameters . . . . . . . . . . . . . . . . . . . . . . . . .26
Setting a Static IP Address and Subnet Mask . . . . . . . . . . . . . .26
Displaying the Static IP Routing Tables . . . . . . . . . . . . . . . . . .26
Configuring the Static IP Routing Tables . . . . . . . . . . . . . . . . .26
Configuring the System Date and Time . . . . . . . . . . . . . . . . . . . . . . . .27
Displaying System Date and Time . . . . . . . . . . . . . . . . . . . . . .27
Manual Date Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Manual Time Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Obtaining Time from a Time Server . . . . . . . . . . . . . . . . . . . .28
Displaying Inventory and Status Parameters . . . . . . . . . . . . . . . . . . . .28
Displaying Unit Inventory Information . . . . . . . . . . . . . . . . . . .28
Displaying BelAir100 Status Parameters . . . . . . . . . . . . . . . . .28
Saving and Restoring the BelAir100 Configuration . . . . . . . . . . . . . . .29
Local Back Up of the Configuration Database . . . . . . . . . . . .29
Saving and Restoring Node Configuration Parameters . . . . . .29
Remote Back Up and Restore of the Configuration Database 30
Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Configuring Security for Wireless Clients . . . . . . . . . . . . . . . . . . . . . .59
Pre-Shared Key WEP Encryption . . . . . . . . . . . . . . . . . . . . . . .61
Managing RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
802.1X Authentication with WEP Encryption . . . . . . . . . . . . .64
WPA1 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
WPA2 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Wireless Client Access Control List . . . . . . . . . . . . . . . . . . . .68
MAC Authorization Response Timeout . . . . . . . . . . . . . . . . .69
Configuring Security for Backhaul Links . . . . . . . . . . . . . . . . . . . . . . .69
Radios with Part Number B2CC033AA . . . . . . . . . . . . . . . . .69
All Other Backhaul Radios . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Controlling Inter-client Communication . . . . . . . . . . . . . . . . . . . . . . .71
Determining the MAC Address of the Internet gateway . . . .71
Disabling or Enabling Access Radio Wireless Bridging . . . . . .72
Disabling Inter-AP Wireless Client Communication . . . . . . . .72
Detecting Rogue Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
BelAir100 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Radio Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
Wireless Communication Statistics . . . . . . . . . . . . . . . . . . . . .97
Wireless Security Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . .97
List of Figures
Figure 1: BelAir100 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Figure 2: Access Radio Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Figure 3: BelAir100 Hardware Module Block Diagram . . . . . . . . . . . . . . . . . . .6
Figure 4: BelAir100 Layer 2 View, Typical Configuration . . . . . . . . . . . . . . . . .7
Figure 5: Wireless Mobility using L2TP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87
Figure 6: Active and Standby Software Loads . . . . . . . . . . . . . . . . . . . . . . . . .99
Figure 7: Software Upgrade Step 3 - Downloading the New Software Load 101
Figure 8: Software Upgrade Step 7 - Commit the Software Load . . . . . . . .103
Figure 9: Backing Out from an Uncommitted Software Upgrade . . . . . . . . .104
Figure 10: Simple BelAir200 and BelAir100 Network Configuration . . . . . .106
Figure 11: Reset Dongle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .130
Figure 12: Removing Cover from a BelAir100 . . . . . . . . . . . . . . . . . . . . . . .131
Figure 13: Installing a Reset Dongle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
Figure 14: Typical Required Equipment for an Optical Ethernet interface . .136
Figure 15: BelAir100 Connector Field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137
Figure 16: Connection Setup for BelAir100 with an Optical Ethernet Interface
138
List of Tables
BelAir Networks Inc. General Information Sales Visit us on the web at:
603 March Road [email protected] [email protected]
Kanata, Ontario www.belairnetworks.com
Canada Technical Support
K2K 2M5 [email protected]
1-877-BelAir1 (235-2471)
613-254-7070
147