Fortress Technologies ecure Wireless Access Bridge Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Pontos de acesso WLAN Fortress Technologies ecure Wireless Access Bridge. Fortress Technologies ecure Wireless Access Bridge User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir

Resumo do Conteúdo

Página 1 - Access Bridge

Fortress Security SystemSecure Wireless Access BridgeUser Guide www.fortresstech.com© 2006 Fortress Technologies

Página 2

Fortress Bridge: Table of ContentsviiiSecure Automatic Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . .105Preconfiguring a New Netw

Página 3 - Fortress Bridge

Fortress Bridge: Command-Line Interface90[VAP]> set vap {1|2|3|4} [-ssid <ssidstring>|.] [-dtim 1-255] [-hidessid on|off] [-rts 1–2345|off] [

Página 4

Fortress Bridge: Command-Line Interface916.4.4.1 Changing Bridge GUI Passwords in the CLINOTE: Pa s s wo r d sshould be a mini-mum of eight charac-ter

Página 5 - Table of Contents

Fortress Bridge: Command-Line Interface92View the encryption algorithm (and the re-keying interval) in effect on the Bridge with show crypto:[GW]>

Página 6 - Configuration 21

Fortress Bridge: Command-Line Interface936.4.5.4 Access ID in the CLIThe Access ID is a 16-digit hexadecimal ID that provides network authentication f

Página 7 - Administration 52

Fortress Bridge: Command-Line Interface94CAUTION: If youwant to be able toaccess the Bridge CLI af-ter outdoor installation,you must enable SSH(secur

Página 8 - Command-Line Interface 80

Fortress Bridge: Command-Line Interface956.4.6 System Date and Time in the CLIView Bridge date and time settings with the show clock command:[GW]>

Página 9

Fortress Bridge: Command-Line Interface96Configure the Bridge interactively to authenticate users through an external RADIUS server with set auth, as

Página 10

Fortress Bridge: Command-Line Interface976.4.9 802.1X Authentication Settings in the CLI6.4.9.1 802.1X Authentication Server SettingsSupport for 802.1

Página 11 - Introduction

Fortress Bridge: Command-Line Interface98In GW mode, use the show command with the 8021X argument to view the server settings:[GW]> show 8021XLan1:

Página 12 - 1.2 Network Security Overview

Fortress Bridge: Command-Line Interface996.4.9.2 Internal LAN Switch Port 802.1X SettingsYou can individually configure each of the ports of the Bridg

Página 13 - 1.3.4 Operating Modes

Fortress Bridge: Introduction1Chapter 1Introduction1.1 Fortress Secure Wireless Access BridgeThe Fortress Secure Wireless Access Bridge is an all-in-o

Página 14 - 1.3.5 Deployment Options

Fortress Bridge: Command-Line Interface100The commands that configure and delete Trusted Devices are valid only in GW (gateway) mode (refer to Section

Página 15 - 1.4 This Document

Fortress Bridge: Command-Line Interface101[GW]> set snmp -c <[email protected]> -l <locationName> -ro <roCmntyName> -rw <rwCm

Página 16 - Installation

Fortress Bridge: Command-Line Interface102[GW]> show deviceHostname:FswabDeviceID:4389C1B376B1AFDDCryptoEngine:AES256IP(Private):172.24.1.27Ssh:Off

Página 17 - 2.2 Preparation

Fortress Bridge: Command-Line Interface103Hosts (labeled Client) are numbered in the order they were added to the database, following the Bridge’s int

Página 18 - 2.2.3 Port Locations

Fortress Bridge: Command-Line Interface1046.6.7 Pinging a DeviceYou can ping devices from the Bridge’s CLI. The Bridge pings three times and then disp

Página 19 - WARNING: To

Fortress Bridge: Command-Line Interface105[AP]> wlan wlanconfig -husage: wlanconfig wlanX create wlandev wifiX wlanmode [sta|adhoc|ap|mo

Página 20 - WARNING: If the

Fortress Bridge: Command-Line Interface1066.8.1 Preconfiguring a New Network Deployment with SACAll of the Bridges to be included in the new network m

Página 21 - 2.4 Outdoor Installation

Fortress Bridge: Command-Line Interface107Allow all of the Bridges to boot before proceeding with SAC: front-panel Stat1 and Stat2 LEDs and the lower

Página 22

Fortress Bridge: Command-Line Interface108Bridges. Alternatively, you can specify only a subnet and allow SAC to automatically generate all member IP

Página 23 - Clear for WAN Port

Fortress Bridge: Command-Line Interface109[GW]> set sac stopSAC Stop Initiated. May take some time to complete...Stopped SAC process successfullyRe

Página 24 - CAUTION: The

Fortress Bridge: Introduction21.1.1.2 Bridge CLIThe Bridge’s command-line interface provides administration and monitoring functions via a command lin

Página 25 - Non-Root, and click Apply

Fortress Bridge: Command-Line Interface110Similarly, the encryption algorithm and re-key interval in effect on the network can be viewed with show cry

Página 26 - 2.4.3 Weatherizing the Bridge

Fortress Bridge: Command-Line Interface111SeriallNum|IpAddress|CfgID|PeerNum|PeerSACStatus|PeerSACState|PeerSACVer24773196|172.24.0.4|19082|2|SAC_PEER

Página 27

Fortress Bridge: Command-Line Interface112[GW]> show sacSwabSerialNum:24743196SwabConfigID:0SwabSACRole:SAC_SLAVESwabSACState:SAC_INIT4SWABSwabSACV

Página 28

Fortress Bridge: Command-Line Interface11316 Disconnect the WAN ports of the new and master Bridges.17 Power cycle the new Bridge.The new Bridge is re

Página 29 - 2.5 Indoor Installation

Fortress Bridge: Fortress Security System Overview114Chapter 7Specifications7.1 Hardware Specifications7.1.1 Performance7.1.2 Physical 7.1.3 Environm

Página 30 - 2.5.2 Configuring the Bridge

Fortress Bridge: Fortress Security System Overview1157.1.4 Compliance7.1.5 Logical InterfacesThe physical connections described in Section 7.1.2 are i

Página 31 - Configuration

Fortress Bridge: Fortress Security System Overview116the wide side up, pins are numbered from right to left, top to bottom.Figure 7.1 RJ-45 and DB9 Pi

Página 32 - 3.2 LAN Settings

Fortress Bridge: Troubleshooting117Chapter 8TroubleshootingProblem SolutionYou are unable toaccess the Bridge GUI.Verify the Bridge’s physical connect

Página 33 - Multicast field

Fortress Bridge: Troubleshooting118The Bridge is notallowing traffic to pass.Verify the Bridge’s physical connections:• from the Bridge’s Unencrypted

Página 34 - 3.3 Radio Settings

Fortress Bridge: Index119Numerics802.11a/b/gsee radio settings, radio band; radios802.1X authentication 33, 35–36for wired devicesin Bridge CLI 99in B

Página 35 - ANT1); Radio 2 uses an

Fortress Bridge: Introduction33) User authentication requires the user of a connecting device to enter a recognized user name and valid creden-tials,

Página 36 - CAUTION:

Fortress Bridge: Index120Bridge CLI 80–105about command 101accessing 81SSH 39, 81, 94troubleshooting 117add/del sp commands 112, 113add/del td command

Página 37 - Preamble setting of Long

Fortress Bridge: Index121Ccablingsee ports, connectionschannel settings 26configuringin Bridge CLI 86–88in Bridge GUI 29with SAC 106–111defaults 26clo

Página 38 - 100 milliseconds

Fortress Bridge: Index122encrypted zoneDevice IDs 70IP addresses 70MAC addresses 70tracking sessions 70–72WAN port configuration 23encryption algorith

Página 39

Fortress Bridge: Index123LLAN settingsconfiguringat installation 13in Bridge CLI 84–85in Bridge GUI 22–24with SAC 106–111default IP address 13, 21, 84

Página 40 - Edit button for each VAP

Fortress Bridge: Index124operator accountsee Bridge GUI, operator accountoutdoor installation 11–19mast mounting 18preconfiguration 12–16requirements

Página 41 - RADIO SETTINGS screen.)

Fortress Bridge: Index125SSACsee Secure Automatic Configurationsafetycompliance 115requirements 1, 8–11, 12, 17, 18see also specificationsSecure Autom

Página 42 - Open WEP and Shared WEP

Fortress Bridge: Index126Ttraceroutein Bridge CLI 104in Bridge GUI 75traffic statistics 68–69see also interface statisticstransmit power settings 26tr

Página 43 - 802.1X Security

Fortress Bridge: Index127weatherizing 10, 16–17cover plate 17requirements 8–11, 18RJ-45 connector boot 16–17Weatherizing Kit 7installation 16–17WEP 32

Página 44 - Edit button for

Fortress : Glossary128Glossary3DESTriple Data Encryption Standard—a FIPS-approved NIST standard for data encryption using 192-bits (168-bit encryption

Página 45

129Fortress : GlossaryBridge GUIThe browser-based graphical user interface through which the Fortress Secure Wireless Access Bridge is configured and

Página 46 - 3.5 Bridge Passwords

Fortress Bridge: Introduction41.3.5 Deployment OptionsThe Fortress Security System is flexible and expandable.Figure 1.1 Example Point-to-Multipoint D

Página 47 - For security

130Fortress : GlossaryfailoverA device or system configuration in which two, identical components are installed for a given function so that if one of

Página 48 - Normal operating mode meet

131Fortress : GlossarygroupsAn association of network objects (users, devices, etc.). Groups are typically used to allocate shared resources and apply

Página 49 - 3.6.3 Encryption Algorithm

132Fortress : GlossaryMaPS ConsoleIn Fortress’s MaPS, a Java-based, configuration client interface for the Fortress Manage-ment and Policy Server, thr

Página 50 - 3.6.5 Access ID

133Fortress : GlossaryRSA SecurID® An authentication method created and owned by RSA Security.RADIUSRemote Authentication Dial-In User Service—an auth

Página 51 - Global and Default Settings

134Fortress : GlossaryUDPUser Datagram Protocol—defines a method for “best effort” delivery of data packets over a network that, like TCP, runs on top

Página 52 - Mode field

Fortress Bridge: Introduction5The Bridge can provide a secure edge for a WLAN (or infrastructure-mode) deployments, as shown in Figure 1.1WARNING: can

Página 53

Fortress Wireless Access Bridge: Installation6Chapter 2Installation2.1 IntroductionNOTE: Only essen-tial configurationsettings, as required forbasic i

Página 54 - Auth Mode, ensure

Fortress Wireless Access Bridge: Installation72.1.2 CompatibilityThe Fortress Bridge is fully compatible with Fortress Secure Client versions 2.4 and

Página 55

Fortress Wireless Access Bridge: Installation82.2.2 Preparing the NetworkAny Ethernet device—including hubs, switches and access points—directly conne

Página 56

Fortress Wireless Access Bridge: Installation9WARNING: TheBridge contai ns a3V (7 year) lithium bat-tery for time-keepingpurposes. It is not in-tende

Página 58 - 3.8 System Date and Time

Fortress Wireless Access Bridge: Installation10PoE powered from a remote 802.11af (13 Watt) PoE midspan source. Circuit Overloading: The Bridge inclu

Página 59 - 3.10 Front-Panel Operation

Fortress Wireless Access Bridge: Installation11NOTE: The ES520complies withUL60950-1 sa f e ty s p e ci -fications. It has a UL(NEMA) 3/3S/4 (andIEC6

Página 60 - BLACKOUT MODE: Disabled), or

Fortress Wireless Access Bridge: Installation122.4.1 Connecting the Bridge for PreconfigurationWARNING: Tocomply with FCCrules, antennas must beprofe

Página 61

Fortress Wireless Access Bridge: Installation131 Open a browser application on a computer on your LAN and, in the browser address field, enter the Bri

Página 62 - Administration

Fortress Wireless Access Bridge: Installation145 From the main menu, select SECURITY SETTINGS, and on the SECURITY SETTINGS screen, in the CHANGE ACCE

Página 63 - Allow. Such a device

Fortress Wireless Access Bridge: Installation15NOTE: If you aredeploying multi-ple Fortress Bridges in apoint-to-point/ multi-point network theymust b

Página 64 - To edit a device:

Fortress Wireless Access Bridge: Installation16NOTE: The BridgeCLI provides ac-cess to some configu-ration settings thatcannot be accessedfrom the Bri

Página 65 - 4.2 User Authentication

Fortress Wireless Access Bridge: Installation17 Slide the compression nut, with the threaded opening facing toward the connector, over the connector

Página 66 - Local au

Fortress Wireless Access Bridge: Installation182.4.4 Mast Mounting the BridgeThe Mast-Mounting Kit accommodates masts from 1.5" to 3" in dia

Página 67 - To edit a user account:

Fortress Wireless Access Bridge: Installation19omnidirectional or directional antenna. The antenna and cable must be waterproof.4 Connect the Bridge&a

Página 68 - To delete a user account:

Fortress BridgeiFortress Secure Wireless Access Bridge 2.6.1Copyright © 2006 Fortress Technologies, Inc. All rights reserved.This document contains pr

Página 69 - 4.3 Trusted Devices

Fortress Wireless Access Bridge: Installation20CAUTION: TheFCC requires co-located radio antennasto be at least 7.9" apart.The Bridge’s antennaco

Página 70 - 4.3.1 Editing Trusted Devices

Fortress Bridge: Configuration21Chapter 3Configuration3.1 The Bridge GUIThe Fortress Wireless Access Bridge’s graphical user interface provides access

Página 71 - 4.4 SNMP Settings

Fortress Bridge: Configuration22The Bridge GUI opens on the Welcome screen. Configuration settings are accessed through the main menu links on the lef

Página 72 - 4.5 Backing Up and Restoring

Fortress Bridge: Configuration233.2.1 Spanning Tree ProtocolNOTE: Bridgingloops can occur ona WLAN only whenmultiple APs s hare thesame ESS (extended

Página 73 - FIPS operating mode

Fortress Bridge: Configuration24NOTE: The IP ad-dress you assignmust be unique on thenetwork.To reconfigure Bridge LAN settings:1 Log on to the Bridge

Página 74

Fortress Bridge: Configuration25NOTE: 802.11b de-vices are fullycompatible with the802.11g radio.Radio 1 is the tri-band 802.11a/b/g radio, which can

Página 75 - Current Software Version

Fortress Bridge: Configuration26 Non-Root - Radios in Non-Root mode do initiate connections with other Fortress Bridges—either directly with a root B

Página 76 - Performing

Fortress Bridge: Configuration273.3.2.3 DistanceThe Distance setting configures the maximum distance—from 1 to 35 miles, in increments of 1 mile—for w

Página 77 - 4.7 Rebooting the Bridge

Fortress Bridge: Configuration283.3.2.5 Beacon IntervalThe Bridge’s radios transmit beacons at regular intervals to announce their presence on the net

Página 78 - Monitoring and Diagnostics

Fortress Bridge: Configuration29Enabled on the LAN SETTINGS screen. If you disable STP on a non-root Bridge, the Multicast field for the radio with a

Página 79 - 5.1.2 Interface Statistics

Fortress BridgeiiDISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPL

Página 80 - 5.2 Tracking

Fortress Bridge: Configuration30unconfigured VAPs for radios in AP radio mode on the VIRTUAL ACCESS POINTS display frame on the INTERFACES screen.You

Página 81

Fortress Bridge: Configuration31Radio 1 is preconfigured with a default SSID of Base-11g; the default SSID for Radio 2 is Base-11a.3.3.4.2 Hide SSID a

Página 82 - 5.3 AP Associations

Fortress Bridge: Configuration32NOTE: Certain Se-curity Suite optionsrequire that an 802.1Xauthentication server beconfigured for theBridge. These inc

Página 83 - 5.4 View Log

Fortress Bridge: Configuration33WEP Key Type - WEP keys can be composed of an ASCII (plaintext) passphrase or hexadecimal string. Hex is the default.W

Página 84

Fortress Bridge: Configuration34WPA and WPA2 generate encryption keys dynamically and exchange keys automatically with connected devices at user- spec

Página 85 - 5.5 Diagnostics

Fortress Bridge: Configuration353.4 802.1X Server and LAN Port SettingsNOTE: The RADI-US server internalto the Bridge cannot beused for 802.1X authen-

Página 86 - HOST MAC DATABASE button

Fortress Bridge: Configuration362 In the 801.1X AUTHENTICATION SERVER frame:NOTE: The serverkey you enter hereshould already bepresent in the 802.1X a

Página 87 - 5.6 Front-Panel Indicators

Fortress Bridge: Configuration37NOTE: For security

Página 88 - 5.6.2 Radio LEDs

Fortress Bridge: Configuration38The viewable, default security settings are shown below.3.6.1 Operating ModeThe Fortress Bridge can be operated in eit

Página 89 - 5.6.3 Port LEDs

Fortress Bridge: Configuration39 If the Bridge fails any self-test on startup, it is rendered inoperable and must be returned to the vendor for repai

Página 90 - Command-Line Interface

Fortress Bridge: Table of ContentsiiiTable of Contents1Introduction 1Fortress Secure Wireless Access Bridge . . . . . . . . . . . . . . . . . . . . .

Página 91 -  hardware flow control: none

Fortress Bridge: Configuration40Bridge. For information on setting encryption algorithms on Secure Clients, refer to your Fortress Secure Client user

Página 92 - 6.2 Getting Help in the CLI

Fortress Bridge: Configuration41on Secure Clients, refer to your Fortress Secure Client user guide.CAUTION: For se-curity reasons, theAccess ID in eff

Página 93 - 6.3 Command Syntax

Fortress Bridge: Configuration42selected and, in the case of device authentication, when it has been globally enabled in the AUTHENTICATION SETTINGS f

Página 94 - 6.4.1 LAN Settings in the CLI

Fortress Bridge: Configuration43The default Auth Server Key is fortress, which you can optionally change.Selecting Local authentication enables the sc

Página 95 - Enter↵, to display the

Fortress Bridge: Configuration443.6.6.4 Enabling/Disabling Device AuthenticationOn a Fortress Bridge configured for Local authentication, the settings

Página 96 - Enter↵ to leave the

Fortress Bridge: Configuration45To configure maximum authentication attempts:1 Log on to the Bridge GUI admin account and select SECURITY SETTINGS fro

Página 97 - NOTE: Because

Fortress Bridge: Configuration46To enable/disable user session timeout login prompts:1 Log on to the Bridge GUI admin account and select SECURITY SETT

Página 98

Fortress Bridge: Configuration47To configure the default user authentication and device state for authenticating devices:1 Log on to the Bridge GUI ad

Página 99 - Enter↵ to

Fortress Bridge: Configuration48To enable/disable blackout mode: 1 Log on to the Bridge GUI admin account and select SYSTEM OPTIONS from the menu on t

Página 100

Fortress Bridge: Configuration493.10 Front-Panel OperationThe Fortress Bridge front panel is equipped with three, recessed buttons: two switches (labe

Página 101 - NOTE: Usernames

Fortress Bridge: Table of ContentsivInstallation Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Outdoor Installat

Página 102 - NOTE: Yo u c a n

Fortress Bridge: Configuration50indicated by the Stat2 LED, which flashes rapidly (green) when the new mode is selected.If you accidentally cycle past

Página 103 - CAUTION: For se

Fortress Bridge: Configuration513.10.2 Rebooting the Bridge from the Front PanelTo reboot the Fortress Bridge from the front-panel:NOTE: There areno L

Página 104 - NOTE: Disabling

Fortress Bridge: Administration52Chapter 4Administration4.1 Device AuthenticationNOTE: The Bridgesupports 802.1Xauthentication throughseparate and unr

Página 105 - Enter↵ to save them

Fortress Bridge: Administration53authenticate on the network. (Refer to Section 3.6.6.5 for detailed instructions.)If a device exceeds the maximum all

Página 106

Fortress Bridge: Administration54Access user configurable settings for an authenticating device by clicking its Edit button under AUTHORIZED DEVICES (

Página 107

Fortress Bridge: Administration552 On the DEVICE AUTHENTICATION screen, click the Edit button of the device for which you want to change settings.3 In

Página 108

Fortress Bridge: Administration56on the AUTHENTICATION SETTINGS frame of the SECURITY SETTINGS screen.On a Fortress Bridge-secured network, user authe

Página 109

Fortress Bridge: Administration57NOTE: In point-to-point/multipointdeployments, Fortressrecommends that youdisable the Restart Ses-sion Login Prompt f

Página 110 - FIPS op

Fortress Bridge: Administration582 On the USER AUTHENTICATION screen, click the Edit button of the user for which you want to change settings.3 In the

Página 111

Fortress Bridge: Administration594.3 Trusted DevicesSome wireless devices—IP phones, digital scales or printers, and APs, for example—are not equipped

Página 112 - NOTE: The term

Fortress Bridge: Table of Contentsv802.1X Server and LAN Port Settings . . . . . . . . . . . . . . . . . . . . . . 35802.1X Authentication Server .

Página 113

Fortress Bridge: Administration60The section of the frame under MANAGED TRUSTED DEVICES shows the Trusted Device you added, with the settings you spec

Página 114 - 6.6.8 Tracing a Packet Route

Fortress Bridge: Administration614.3.2 Deleting Trusted DevicesYou can delete Trusted Devices one at a time, or by selecting multiple devices for dele

Página 115 - NOTE: You cannot

Fortress Bridge: Administration624.4.1 Configuring SNMP1 Log on to the Bridge GUI admin account and choose SNMP SETTINGS from the menu on the left.2 I

Página 116 - Deployment with SAC

Fortress Bridge: Administration63Table 4.1. User Configured Settings Backed Up for the Bridgefunction settingnetworkSTP enable/disableWAN port encryp

Página 117

Fortress Bridge: Administration644.5.1 Backing Up the Bridge Configuration1 Log on to the Bridge GUI admin account and choose SYSTEM OPTIONS from the

Página 118 -  192.168.0.0–192.168.255.255

Fortress Bridge: Administration654.6 Software Versions and UpgradesFortress Technologies regularly releases updated versions of the Bridge software th

Página 119

Fortress Bridge: Administration66 Click Apply (or Cancel the operation).4 Click OK on the system confirmation dialog.The frame displays Uploading fil

Página 120

Fortress Bridge: Administration674.7 Rebooting the BridgeThe reboot option power cycles the Bridge, ending all sessions and forcing Secure Client devi

Página 121

Fortress Bridge: Monitoring and Diagnostics68Chapter 5Monitoring and Diagnostics5.1 StatisticsThe statistics screen displays statistics for overall en

Página 122

Fortress Bridge: Monitoring and Diagnostics695.1.1 Traffic StatisticsThe packets that the Fortress Bridge has transmitted to and received from the enc

Página 123 - <serialnumber>

Fortress Bridge: Table of ContentsviTrusted Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59Adding Trusted De

Página 124 - Specifications

Fortress Bridge: Monitoring and Diagnostics70 BYTES - the total number of bytes received/transmitted on the interface PACKETS - the total number of

Página 125 - 7.1.5 Logical Interfaces

Fortress Bridge: Monitoring and Diagnostics71 Idle Since - the number of hours, minutes and seconds since the device was last active on the network.

Página 126

Fortress Bridge: Monitoring and Diagnostics72Each device entry on the TRACKING screen is preceded by a checkbox that, when checked, resets the network

Página 127 - Troubleshooting

Fortress Bridge: Monitoring and Diagnostics73 Channel - identifies the channel, by number, over which the Bridge and the associated device are commun

Página 128 - Failed to decrypt

Fortress Bridge: Monitoring and Diagnostics74 when Secure Clients contact and negotiate keys with the Fortress Bridge system configuration changes

Página 129

Fortress Bridge: Monitoring and Diagnostics755.5 DiagnosticsNOTE: Radio 1uses antenna port1 (ANT1); Radio 2 usesantenna port 2 (ANT2).Access Fortress

Página 130

Fortress Bridge: Monitoring and Diagnostics765.5.3 Flushing the Host MAC DatabaseThe Fortress Bridge maintains a database of the MAC addresses of devi

Página 131

Fortress Bridge: Monitoring and Diagnostics775.6 Front-Panel IndicatorsNOTE: There areno LED indica-tions in a Bridge inblackout mode (refer to

Página 132

Fortress Bridge: Monitoring and Diagnostics78Stat2 can exhibit: solid green - The Bridge is operating in root mode. off - The Bridge is operating in

Página 133

Fortress Bridge: Monitoring and Diagnostics79Both upper and lower LEDs can exhibit: off - The associated radio is disabled (in the Bridge GUI or CLI)

Página 134

Fortress Bridge: Table of ContentsviiGetting Help in the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82Command Syntax .

Página 135

Fortress Bridge: Command-Line Interface80Chapter 6Command-Line Interface6.1 IntroductionNOTE: Fortre ssBridge featuresand functions are de-scribed in

Página 136

Fortress Bridge: Command-Line Interface816.1.1 CLI Administrative ModesThere are two administrative modes in the Bridge CLI. NOTE: Bridge CLIhelp outp

Página 137

Fortress Bridge: Command-Line Interface82WSG login: sysadmNOTE: The defaultCLI password issysadm. Passwordsshould never be left attheir defaults.Passw

Página 138 - Glossary

Fortress Bridge: Command-Line Interface83Note that only those options available in the current administrative mode are displayed and that valid comman

Página 139 - Fortress : Glossary

Fortress Bridge: Command-Line Interface84 Switch refers to the identifier, preceded by a dash (hyphen), for the argument to follow (ex., -ip, -n, etc

Página 140

Fortress Bridge: Command-Line Interface85The CLI displays the configurable fields for set network one at a time. Enter a new value for the field—or le

Página 141

Fortress Bridge: Command-Line Interface86[AP]> show radio[RADIO 1] Radio State: On Radio Band: 802.11g Radio Mode: AP Channel: 1

Página 142

Fortress Bridge: Command-Line Interface87[AP]> set radio 1Radio state [on|off] (on):Radio band [802.11g|802.11a] (802.11g): 802.11a[OK]Reboot is re

Página 143

Fortress Bridge: Command-Line Interface88The sample output for the show radio command (at the beginning of this section) shows the default radio setti

Página 144

Fortress Bridge: Command-Line Interface89By default a single virtual access point (vap 1) is configured for each radio. The SSIDs associated with thes

Comentários a estes Manuais

Sem comentários