WS5100 Series Switch
Motorola, Inc. All rights reserved
Contents
Switch Services
Network Setup
TOC-3
Switch Security
Diagnostics
Switch Management
TOC-5
TOC-6WS5100 Series Switch System Reference Guide
Document Conventions
Introduction
Documentation Set
Notational Conventions
Hardware Overview
Overview
Power Cord Specifications
Physical Specifications
Power Protection
System Status LED Codes
Start Up
Error Codes
Primary
Standby
Software Overview
Infrastructure Features
Switch includes the following Infrastructure features
Configuration Management
Installation Feature
Text Based Configuration
Licensing Support
Tracing / Logging
Serviceability
Process Monitor
Hardware Abstraction Layer and Drivers
Password Recovery
Wireless Switching
Switch includes the following wireless switching features
Secure Network Time Protocol Sntp
Rate Limiting
Physical Layer Features 802.11a
802.11bg
HotSpot / IP Redirect
Proxy-ARP
Voice Prioritization
IDM Identity Driven Management
Self Healing
Currently voice support implies the following
Wireless Capacity
Neighbor Configuration
Detector APs
Self Healing Actions
MU Balancing Across Multiple APs
AP Balancing Across Multiple Switches
Wireless Roaming
MU Move Command
Interswitch Layer 2 Roaming
L3 Roaming
Fast Roaming
2.12 QoS
Power Save Polling
802.11e QoS
802.1p Support
Data QoS
Wireless Layer 2 Switching
Dcscp to AC Mapping
Automatic Channel Selection
Switch includes the following wired switching features
Wired Switching
Dhcp Servers
Ddns
WS5100 switch supports 32 Wlans
Management Features
Vlan Enhancements
Interface Management
Switch includes the following wired security features
Security Features
Encryption and Authentication
Keyguard-WEP
MU Authentication
Kerberos
802.1x EAP
5.7 802.1x Authentication
Switch-to-Wired
Secure Beacon
MU to MU Allow
Reset Username/Password to Factory Defaults
Change Username/Password after AP Adoption
Lldp is always enabled and cannot be disabled
Ieee 802.1AB Lldp
Rogue AP Detection
RF scan by Access Port on all channels
Rogue AP Report
Snmp Trap on discovery
Authorized AP Lists
Certificate Management
Access Port Support
5.14 NAT
Web UI Requirements
Accessing the Switch Web UI
Content of this chapter is segregated amongst the following
Connecting to the Switch Web UI
Switch Web UI Access and Image Upgrades
Switch Password Recovery
Upgrading the Switch Image from 1.4.x or 2.x to Version
Upgrading the Switch Image
Auto Installation
Enables are set using the autoinstall feature command
Configuring Auto Install via the CLI
AP-4131 Access Point to Access Port Conversion
Downgrading the Switch Image
Enables are cleared using the no autoinstall feature
Whenever a string is blank it is shown as --not-set
Select the AP Installation main menu item
Select the Special Functions main menu item
10WS5100 Series Switch System Reference Guide
It consists of the following two tabs
Viewing the Switch Interface
Viewing the Switch Configuration
Time Displays the time of day used by the switch Time Zone
Troubleshooting
Incorrectly could render your switch as operating illegally
System Name
Viewing Dashboard Details
Severity Last Occurrence Message # Occurrences
Name
Viewing Switch Statistics
Status
Speed
Avg Signal
Utilization issues negatively impacting performance
Number of MUs
Associated Number of APs
Viewing the Port Configuration
Viewing Switch Port Information
Duplex Displays the port as either half or full duplex
Editing the Port Configuration
Modified
Viewing the Ports Runtime Status
Viewing the Ports Statistics
Ethernet ports have a maximum MTU setting
Name Displays the ports current name MAC Address
Oper Status
Indication of a network problem
Packets In Error
Network issues
Different port could be required
Detailed Port Statistics
Output Unicast
Viewing the Port Statistics Graph
Output Packets
With interface is saturated
Switch Information
Size Bytes
Viewing Switch Configurations
Viewing the Detailed Contents of a Config File
Main screen displays the contents of the configuration file
Editing a Config File
Transferring a Config File
Path
Viewing Switch Firmware Information
Password
Editing the Switch Firmware
Enabling Global Settings for the Failover Image
If using TFTP, use tftp//ipaddress/path/filename
Updating the Switch Firmware
Boot of the switch
Configuring Automatic Updates
Enable
Password Enter the password required to access the server
Setting
File Name With
Protocol
View By
Viewing the Switch Alarm Log
View All
Index
Viewing Alarm Log Details
Solution
Viewing Switch Licenses
Description
Possible Causes
How to use the Filter Option
30WS5100 Series Switch System Reference Guide
Displaying the Network Interface
Network Setup
Switch Virtual
Resolution Entries
Wireless LANs
DNS Servers
Access Ports
Configuring DNS
Viewing Network IP Information
Select the Domain Network System tab
Adding an IP Address for a DNS Server
Configuring Global Settings
Obsolete addresses are periodically removed
Server IP Address
Configuring IP Forwarding
Following details display in the table
Active
Adding a New Static Route
Route Metric
Select the Address Resolution tab
Viewing Address Resolution
Typically a Vlan
Type
Viewing and Configuring Layer 2 Virtual LANs
Trunk
Mode It can be either Access or Trunk
Ethernet 1 or ethernet
Is selected, the Allowed VLANs field is unavailable
Editing the Details of an Existing Vlan
Mode drop-down menu
Configuring Switch Virtual Interfaces
Configuring the Virtual Interface
Name Displays the name of the virtual interface
Following configuration details display in the table
Displays the Vlan ID associated with the interface
Up or not Down
Modifying a Virtual Interface
Adding a Virtual Interface
To add a new virtual interface
To modify an existing virtual interface
Viewing Virtual Interface Statistics
Packets, etc
Viewing Virtual Interface Statistics
Only hard-coded at the factory and cannot be modified
Viewing the Virtual Interface Statistics Graph
Click Close to close the dialog
Viewing and Configuring Switch WLANs
Configuring WLANs
4094. The default Vlan ID is
Enabled
Authentication
Modify the WLAN’s current authentication scheme
Editing the Wlan Configuration
Intended function of the Wlan
Value used is unique
Tunnel
No Authentication
802.1X EAP
Kerberos
Refer to the Advanced field for the following information
Configuring 802.1x EAP
Configuring Authentication Types
MU Max Retries
Configuring Kerboros
MU Timeout
28WS5100 Series Switch System Reference Guide
Switch Hotspot Redirection
Configuring Hotspots
Configuring an Internal Hotspot
Header Text
Title Text
Footer Text
Small Logo URL
Descriptive Text
Configuring External Hotspot
Main Logo URL
Failed Page URL
Login Page URL
Need to provide correct login information to access the Web
34WS5100 Series Switch System Reference Guide
Configuring Advanced Hotspot
Network Setup
Configuring External Radius Server Support
Configuring Dynamic MAC ACL
Authentication data source. The default port is
Address Authentication data source Radius Port
Secret Secondary Radius server Server Timeout
Radius Server
Motorola user privilege values User login source
Configuring the User Login Sources
Configuring Different Encryption Types
Configuring WEP
Key 1011121314 2021222324 3031323334 4041424344
Configuring WEP 128 / KeyGuard
Key
Default hexadecimal keys for WEP 128 and KeyGuard include
Use the Key #1-4areas to specify key numbers
Configuring WPA/WPA2 using Tkip and Ccmp
Bit Key
Ascii Passphrase
From entering the 256-bit key each time keys are generated
Viewing Wlan Statistics
Pre-Authentication
PMK Caching
Opportunistic Key
Ssid is the Service Set ID Ssid for the selected Wlan
That may have similar characteristics
Last 30s
Last Hr
Viewing Wlan Statistics in Detail
Refer to the RF Status field for the following information
Viewing Wlan Statistics in a Graphical Format
Refer to the Errors field for the following information
50WS5100 Series Switch System Reference Guide
Viewing Wlan Switch Statistics
Click the VLAN/Tunnel Assignment tab
Edit button on the Configuration tab within the WLANs
Viewing VLAN/Tunnel Assignments
Configuring WMM
Access
WMM enabled
Four Access Category types are
Background Optimized for background traffic
Category Network traffic Dscp to Access
Access Category to
Category Network traffic
Generic QoS GQoS application programming interface API
Read-only and cannot be modified within this screen
Editing WMM Settings
Viewing MU Status
Viewing Associated MU Details
CW Minimum
CW Maximum
This address is burned into the ROM of the MU
Power Save
Ready
Interoperating with
Displays of the Wlan the MU is currently associated with
Similar configurations
Viewing MU Details
Viewing MU Statistics
Selected MU from the access port
Configuration
Possible network or hardware problems
Address is hard coded at the factory and cannot be modified
Viewing MU Statistics in Detail
Hard-coded at the factory and cannot be modified
Refer to the Traffic field for the following information
View a MU Statistics Graph
Viewing Access Port Information
Name Displays a user assigned name for the radio
Configuring Access Port Radios
Access Ports screen consists of the following tabs
Refer to the Properties field for the following
Configuring Layer 3 Access Port Adoption on
Configuring an AP’s Global Settings
Click the Configure Port Authentication button
Port Authentication
Editing AP Settings
Network Setup
MUs that can associate to a radio is
Maximum MUs
Beacon Interval
RTS Threshold
Dtim Periods
Configuring Rate Settings
Self Healing Offset
Adding APs
Viewing AP Statistics
Average Mbps
Differentiate the radio from other device radios
Packets that are sent and received
RF Util
Viewing AP Statistics in Detail
Was encountered on the configured channel
Statistic for the last hour
Viewing AP Statistics in Graphical Format
Click the Wlan Assignment tab
Configuring Wlan Assignment
Its intended coverage area or function
Configurations
Editing a Wlan Assignment
Identifier such as 1/4, 1/3, etc
From the description field in the Radio Configuration screen
Editing WMM Settings
To view existing Radio Configuration information
Viewing Access Port Adoption Defaults
Configuring AP Adoption Defaults
Channel. Default is random
Options include Indoor or Outdoor. Default is Indoor
Power dBm
Defaults are 20 dBM for 802.11bg and 17 dBm for 802.11a
Editing Default Radio Adoption Settings
Stations that can associate to a radio are
Dtim Period
Transmission path
Configuring Rate Settings
Configuring Layer 3 Access Port Adoption
Select/Change Assigned WLANs
Assigned WLANs tab displays two fields Select Radios/BSS
Cannot be modified
Access Category reflects the radios intended network traffic
Higher priority traffic
Editing Access Port Adoption WMM Settings
To edit the existing WMM settings
Viewing Adopted Access Ports
Viewing Access Port Status
Viewing Unadopted Access Ports
Unadopted AP tab displays the following information
Network Setup
96WS5100 Series Switch System Reference Guide
Switch Services
To display a Services Summary
Displaying the Services Interface
Dhcp Servers
NTP Time
For information on configuring GRE tunneling, see
Dhcp Server Settings
Configuring the Switch Dhcp Server
Pool Name
Lease Time
Editing the Properties of an Existing Dhcp Pool
Ddhhmm
Domain
Adding a New Dhcp Pool
Click the Add button at the bottom of the screen
Configuring Dhcp Global Options
Configuring Dhcp Server Ddns Values
10WS5100 Series Switch System Reference Guide
Can be assigned
Viewing the Attributes of Existing Host Pools
Hardware Address
Client Name
Configuring Excluded IP Address Information
Configuring Dhcp Server Relay Information
14WS5100 Series Switch System Reference Guide
Viewing Dhcp Server Status
Refer to the contents of the Status tab for the following
Configuring Secure NTP
Defining the Sntp Configuration
Refer to the Other Settings field to define the following
Adding a New Sntp Symmetric Key
Defining a Sntp Neighbor Configuration
Hostname
When adding or editing an NTP neighbor
Support
Neighbor Type
Adding an NTP Neighbor
Viewing Sntp Associations
Select the NTP Associations tab
Leap
Viewing Sntp Status
Transmissions are synchronized
Found in some workstations
Root Dispersion
Configuring Switch Redundancy
Root delay
26WS5100 Series Switch System Reference Guide
Redundancy ID
Redundancy Switch
Mode
Discovery Period
Reviewing Redundancy Status
Redundancy Group License Aggregation Rules on
Configuring Redundancy Group Membership
Values
Do not match this switch’s parameters
Not Seen The member is no more seen by this switch
Module
Displaying Redundancy Member Details
Updates Sent
Complimentary with this switch’s version?
Updates Received
Adoption Capacity
Adding a Redundancy Group Member
Redundancy Group License Aggregation Rules
Layer 3 Mobility
Configuring Layer 3 Mobility
36WS5100 Series Switch System Reference Guide
Switch Services
Defining the Layer 3 Peer List
Select the Peer Statistics tab
Reviewing Layer 3 Peer List Statistics
Reviewing Layer 3 MU Status
Configuring GRE Tunnels
Assigning priority to different types of traffic
Destinations IP
To configure GRE tunnelling on the switch
Source IP
Interface IP
Disabled
Editing the Properties of a GRE Tunnel
Adding a New GRE Tunnel
Select the Enable Neighbor Recovery checkbox
Configuring Self Healing
Select the Neighbor Details tab
Configuring Self Healing Neighbor Details
Editing the Properties of a Neighbor
Switch Services
Configuring Discovery Profiles
Configuring Switch Discovery
To be located
Profile Name
Start IP Address
Network devices is conducted
Adding a New Discovery Profile
Viewing Discovered Switches
Different profile for the switch discovery process
Assigned using the Switch Configuration screen
Discovery profile and launching a new search
New search
Displaying the Main Security Interface
Switch Security
Detection
Wireless Filters
Certificates
Trustpoints
AP Intrusion Detection
Enabling and Configuring AP Detection
To configure AP Detection
Unapproved AP
Timeout
Refresh Time
BSS MAC Address
Any MAC Address
Adding or Editing an Allowed AP
Specific MAC
Address Particular index
To review the attributes of allowed APs
Approved APs Reported by APs
Therefore interpreted as a threat on the network
Unapproved APs Reported by APs
Address to a new Allowed AP index
Dbm
Essid to a new Allowed AP index
Unapproved APs Reported by MUs
Seconds Detecting AP
To configure MU intrusion detection
Configuring MU Intrusion Detection
MU Intrusion Detection
As a threat
Contents of the MUs that have been filtered thus far
Switch columns
Violation Type
Mobile Unit
Identifier
Click on Revert to rollback to the previous configuration
Viewing Filtered MUs
Configuring Wireless Filters
Refer to the Associated WLANs field for following
Filters field contains the following read-only information
Editing an Existing Wireless Filter
Enter the a hex value for the Starting MAC address
Adding a new Wireless Filter
Associating an ACL with Wlan
Configuring ACLs
ACL Overview
Switch supports the following ACLs to filter traffic
Router ACLs
For more information, see
Port ACLs
Precedence Order
Wireless LAN ACLs
ACL Actions
Adding a New ACL
Configuring an ACL
Adding a New ACL Rule
22WS5100 Series Switch System Reference Guide
Editing an Existing Rule
Attaching an ACL
Adding a New ACL Configuration
Eth1
Eth2
Click on the Attach tab Click on the Add button
Attaching an ACL on a Wlan Interface/Port
Displays the IP ACL configured
Adding a New ACL Wlan Configuration
Displays the MAC ACL configured
Direction
Reviewing ACL Statistics
Click on the Dynamic Translation tab
Configuring NAT Information
Defining Dynamic NAT Translations
LAN over the switch managed network
Anywhere on the Internet
Access List
Type Displays the NAT type as either
Adding a New Dynamic NAT Configuration
Click the Static Translation tab
Defining Static NAT Translations
Click on the Static Translation tab
Adding a New Static NAT Configuration
Switch Security
Available from the drop-down menu for use as the interface
Configuring NAT Interfaces
Viewing NAT Status
Inside-Global
Configuring IKE Settings
World
Inside Local
Click the Configurations tab
Defining the IKE Configuration
Aggressive Mode
Setting IKE Policies
Peer IP Address
Peers
Switch Security
Default value
SHA The default value
Priority
Highest priority value
Secret without transmitting it to one another
Include
Options include
Viewing SA Statistics
Configure a Dhcp Sever to give public IP address
Configuring IPSec VPN
Configure security associations parameters
Defining the IPSec Configuration
Transport
Editing an Existing Transform Set
Adding a New Transform Set
AH Authentication
ESP Encryption
Tunnel or Transport
Scheme Include None No AH authentication is used
Click the IP Range tab to view the following information
Defining the IPSec VPN Remote Configuration
Configuring Ipsec VPN Authentication
Default port is
Click the Authentication tab
Port
Shared Secret
Configuring Crypto Maps
Priority / Seq
Crypto Map Entries
Click the Crypto Maps tab and select Crypto Map Entries
ACL ID
Mode Config
Crypto Map Peers
Priority / Seq #
Click the Crypto Maps tab and select Peers
Higher the priority
Peer Name
Set for protecting the data flow
Crypto Map Manual SAs
Transform Set
Crypto Map Transform Sets
Protecting the data flow
Crypto Map Interfaces
Viewing IPSec Security Associations
Index from others with similar configurations
Setting up Radius on the switch entails the following
Configuring the Radius Server
Radius Overview
TLS and MD5 Ttls and PAP
Ttls and MSCHAPv2 Peap and GTC Peap and MSCHAPv2
User Database
Using the Switch’s Radius Server Versus an External Radius
Defining the Radius Configuration
Radius Proxy Server Configuration
Radius Client Configuration
Configuring Radius Authentication and Accounting
EAP and Auth Type Specify the EAP type for the Radius server
Cert Trustpoint
Configuring Radius Users
CA Cert Trustpoint
Activity is detected
Their Radius privileges expire
User
Guest User
Configuring Radius User Groups
Guest Group
Select the Groups tab
Time of access
Configured WLANs
Viewing Radius Accounting Logs
Available WLANs
Select the Accounting Logs tab
Creating Server Certificates
Automatically once they reach their limit
Size
Certificate was issued
Using Trustpoints to Configure Certificates
City L
Within the State/Prov stated
Creating a Server / CA Root Certificate
Key for you new certificate
Using the Wizard to Create a New Certificate
78WS5100 Series Switch System Reference Guide
Organization Unit
City
Organization
Requests
Using the Wizard Delete Operation
To use the wizard to delete trustpoint properties
Click the Next button to complete the trustpoint removal
Configuring Trustpoint Associated Keys
Key Label
Adding a New Key
Select the Keys tab Keys tab displays the following
Transferring Keys
84WS5100 Series Switch System Reference Guide
Displaying the Management Access Interface
Switch Management
Log Output
Configuring Access Control
To configure access control settings on the switch
Network. This setting is enabled by default
Enable Telnet
Long as the Enable Telnet option remains enabled
Enable Snmp Retries
360 is associated with the SSH-Server
Configuring Snmp Access
Community Name
Configuring Snmp v1/v2 Access
Access Control
Editing an Existing Snmp v1/v2 Community Name
Configuring Snmp v3 Access
User Name
Unique SNMPv3 usernames and passwords include
Select Management Access Snmp Access from the main menu tree
Editing a Snmp v3 Authentication and Privacy Password
V2/V3 Metrics
Accessing Snmp v2/v3 Statistics
Read-Only errors
Usm Statistics Values
To configure Snmp trap definitions
Configuring Snmp Traps
Enabling Trap Configuration
Redundancy
Wireless
Miscellaneous
Mobility
To configure Snmp trap threshold values
Configuring Trap Thresholds
Threshold Name
Generation
14WS5100 Series Switch System Reference Guide
Radio Range Wlan Range Wireless Units
Wireless Trap Threshold Values
To configure the attributes of Snmp trap receivers
Configuring Snmp Trap Receivers
To add a new Snmp trap receiver
Editing Snmp Trap Receivers
Adding Snmp Trap Receivers
Configuring Local Users
Configuring Management Users
Creating a New Local User
Modifying an Existing Local User
Provides read-only permissions
Redundancy/clustering and control access
Creating a Guest Admin and Guest User
Assign the guest-admin WebUser Administrator access
Configuring Switch Authentication
Assignment is from 1
Not a DNS name
Modify the following Radius Server attributes as necessary
Modifying the Properties of an Existing Radius Server
Address Not a DNS name Radius Server Port
Adding a New Radius Server
Is from 1
Session. The available range is between 0
Switch Management
28WS5100 Series Switch System Reference Guide
Displaying the Main Diagnostic Interface
Diagnostics
Switch Environment
CPU Performance
Switch Disk Allocation
Switch Memory Allocation
Buffer
Usage
Switch Memory Processes
Other Switch Resources
Select the Other Resources tab
Configuring System Logging
Log Options
8WS5100 Series Switch System Reference Guide
Log level
File Management
Made, they have been accounted for
Date
Viewing the Entire Contents of Individual Log Files
Transferring Log Files
Reviewing Core Snapshots
File extension is always .core for core files
Troubleshooting issues
Transferring Core Snapshots
Select a target file, and select the Transfer Files button
Reviewing Panic Snapshots
Panic actually occurred
Remaining nine are renamed so the newest can be saved as
Size Displays the size of the panic file in bytes Created
Transferring Panic Files
Viewing Panic Details
Debugging the Applet
Select Diagnostics Applet Debugging from the main menu
Configuring a Ping
Not received by the switch from its target device
Timeout sec
Time between the switch and its connected device
New ping test is required
Adding a New Ping Test
Modifying the Configuration of an Existing Ping Test
Timeoutsec
Between the switch and its connected device
Within the Configuration tab
Test Name
Test description to convey the overall function of the test
Viewing Ping Statistics
Last Response
Average RTT
24WS5100 Series Switch System Reference Guide
General Information
Motorola’s Enterprise Mobility Support Center
Customer Support Web Site
2WS5100 Series System Reference Guide
Page
Motorola INC