Symbol Technologies WS 2000 manual Configuring the WLANs

Page 127

A Field Office Example

Configuring the WLANs

Leo has specified which Access Ports go with which wireless LANs (WLANs). Now, he needs to name and configure each WLAN. He expands the Wireless node in the left menu, and selects the first WLAN listed.

Leo gives the WLAN the name “EngWLAN” so that subsequent screens in the WS 2000 interface will be a little easier to read. The ESSID is the identification string that his users will see, so he uses a name that will be easy for them to recognize, the string “Engineering.” The interface shows that this WLAN is already part of the Engineering subnet, so there is no reason to change that.

In the Advanced section of the screen, the Disallow MU to MU Communications would keep mobile units from communicating directly with each other. Leo believes that people sometimes share files directly, laptop to laptop, instead of using the file server. Leo does not want to prevent this type of communication, so he leaves this option disabled.

The Use Voice Prioritization option allows voice over IP (VoIP) devices, such as net phones, to have high priority access to the network. Without high priority access to the network, voice calls can rapidly degrade in quality when the network is busy. Leo does not think anyone is doing VoIP, but he is not sure, so he leaves that option turned on.

Answer Broadcast ESS instructs the Access Ports on this WLAN to respond to communications from mobile units that do not know what the ESSID for the wireless network is and which are using a default ESSID of “101”. Leo knows that there are no such units in the office; if there were they would not have worked with the previous access point. Leo removes the selection check from the checkbox next to this option.

Multicast Address 1 and Multicast Address 2 are options included for compatibility with some VoIP phones that use multicast packets. Listing the multicast address allows the voice packets to avoid the usual multicast queue and improves the quality of the VoIP voice traffic. Leo doesn’t have any known need for these, so he leaves the addresses at the default.

Leo clicks the Apply button to save his changes.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

127

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

 

Image 127
Contents System Reference WS 2000 Wireless Switch Version72E-67701-01 Rev a March Patents CopyrightTable of Contents Chapter Advanced Configuration Chapter Field Office Example 111 About this Document WS 2000 Wireless Switch System Reference GuideDocument Conventions Firewall Security Management of Access PortsWireless LAN Wlan Security System OverviewPhysical Specifications Technical SpecificationsHardware Overview Environmental Specifications Operating System OS ServicesCell Controller Services Power SpecificationsGateway Services 802.11b Support 802.11a SupportAccess Ports WS 2000 Wireless Switch Firewall Gateway ServicesNetwork Address Translation NAT Overview Layer 3 RoutingSnmp Management Support Dhcp Client and ServerWEP 64 40-bit key 802.1x with Radius AuthenticationWEP 128 104-bit Key Kerberos Authentication 802.1x with Shared Key AuthenticationKeyGuard-MCM Support Wireless Protected Access WPASet up Communication to the Switch Installing the SwitchGetting Started Overview Getting Started Overview Changing the Administrator Password Configuring the Switch Configure the LAN InterfaceField Description Defining the SubnetsInterfaces Configure SubnetsDhcp Configuration Advanced Dhcp Settings Communicating with the Outside World Configure the WAN InterfaceSetting Up Point-to-Point over Ethernet PPPoE Communication Chap Enable Wireless LANs WLANsWireless Summary Area Access Port Adoption Configure WLANsField Description Name Configure Wlan SecuritySubnet 802.1x EAP Authentication Setting the Authentication MethodKerberos Authentication Setting the Encryption MethodConfiguring WEP Encryption Configuring WPA-TKIP Configure Wlan Security No Encryption KeyGuard-MCMMobile Unit Access Control List ACL Configure Access PortsConfigure Access Ports Name Configure Subnet AccessYellow Access Overview TableAccess Exception Area Color Access Type Description GreenHttp Protocol Transport Description Port UsedALL Transport DescriptionWLAN-How to Configure Advanced Settings Advanced ConfigurationWLAN-Setting Default Access Port Settings WLAN-Setting Default Access Port Settings Dtim Period Beacon IntervalPrimary Wlan WLAN-Advanced Access Port SettingsSecurity Beacon WLAN-Advanced Access Port Settings Beacon is a packet broadcast by the adopted access ports to Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure Network Address Translation NAT Always On Firewall Filters Gateway-How to Configure the WS 2000 FirewallConfigurable Firewall Filters Mime Flood Attack Check Gateway-How to Configure Static RoutesRIP Setting the RIP ConfigurationDefining Routes No RIPNone Security-How to Configure 802.1x EAP AuthenticationRIP v2 CompatSecurity-How to Configure 802.1x EAP Authentication Security-How to Configure 802.1x EAP Authentication Security-How to Configure Kerberos Authentication Security-How to Specify a Network Time Protocol NTP Server Location Description Switch SettingsWS 2000 Wireless Switch LED Functions OverviewChanging the Name of the Switch Location field Change the Location and Country Settings of the WSUpdating the WS 2000 Wireless Switch’s Firmware How to Restart the WS 2000 Wireless SwitchPerforming the Firmware Update Checking for and Downloading Firmware updatesExporting and Importing Wireless Switch Settings System ConfigurationTo Import Settings to a Local File To Import or Export Settings to an FTP SiteTo Export Settings to a Local File How to Restore Default Configuration Settings Property Value Setting Up Snmp v1/v2c Community Definitions Remote AdministrationHow to Configure Snmp Traps Setting the Snmp Version ConfigurationAuthPriv Setting Up Snmp v3 Community DefinitionsNoAuth AuthNoPrivSetting the Trap Configuration Setting Up the Access Control ListCold Start AuthenticationConfiguration Trap Trap Name Generates a Trap when… CategorySetting the Trap Configuration for Snmp v1/v2c Setting the Trap Configuration for Snmp Configure Administrator AccessAccess Port Description Configure Management AccessStatistics and Logs Access Port StatisticsSetup AirBEAM Software Access Changing the Administrator and Manager PasswordsGeneral Access Port Information Associated Mobile Units Received and Transmitted TablesSubnet Statistics Transmitted Description Field Received Field DescriptionInterfaces WAN StatisticsReceived Field Description Viewing the Log on the Switch Setting Up and Viewing the System LogSetting Up a Log Server Background Retail Use CasesPlan Contacting the Wireless Switch Configuring the System SettingsEntering the Basic System Settings Setting Access Control IP Address Plan Configuring the SubnetsSubnet IP Address Range For each subnet Configuring POS SubnetConfiguring the Printer Subnet Retail Use Cases Configuring the Cafe Subnet Retail Use Cases Configuring the WAN Interface Configuring Network Address Translation NAT Retail Use Cases Inspecting the Firewall Configuring the Access PortsSetting Access Port Defaults Switch Port Connected toNaming the POS Access Port Configuring the Printer Access Port Configuring the Cafe Access Port Associating the Access Ports to the WLANs Configuring the Cafe Wlan Configuring the WLANsName Printer Configuring the Printer WlanFor the POS WLAN, she makes the following choices Configuring the POS WlanSetting Subnet Access Retail Use Cases Client IP Address Subnet Mask Gateway Port Testing ConnectionsConfiguring the Clients Wireless Authentication Encryption ChannelField Office Example Plan Configuring the System Settings Entering the Basic System Settings Setting Access Control Field Office Example Configuring the Engineering LAN Configuring the LANField Office Example Field Office Example Configuring the Sales Subnet Configuring the WAN Field Office Example Setting Up Network Address Translation Field Office Example Adoption List Label Confirm Firewall ConfigurationAdopting Access Ports MAC Address LocationField Office Example Configuring the WLANs Security Field Office Example Wlan Field Office Example Field Office Example Field Office Example Access Port Channel Configuring Subnet Access Installing the Access Ports and Testing Appendix A. Sample Configuration File NTP menu Wlan 1 configuration set mode 1 enable Wlan 3 configuration set mode 3 disable Default 802.11 a radio configuration set reg a in/out 149 Access Port configuration LAN Dhcp configuration network Firewall configuration set syn enable Outbound 1-To-Many NAT configuration set outb map s1 Page Index FTP Snmp 802.1x EAP authentication