Ws-5000 User Manual
Ws-5000 User Manual
Ws-5000 User Manual
Patents
This product is covered by one or more of the patents listed on the website: http://www.symbol.com/patents.
Contents
11.2.1 Updating the Access Point Firmware Using the TFTP Program . . . . . . . . . . . 11-3
11.2.2 Updating the Access Point Firmware Using the XMODEM . . . . . . . . . . . . . . 11-3
11.2.3 Adding an Access Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
11.2.4 Mapping BSS and ESS IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
11.3 Reverting to Access Point Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-4
11.4 WS5000 Switch Applet Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-5
This preface introduces the WS5000 Series Switch System Reference Guide and contains the following
sections:
• Who Should Use this Guide
• How to Use this Guide
• Conventions Used in this Guide
• Service Information
Chapter 1, “WS5000 Series Review the overall feature set of the WS5000 Series Switch, as well as the many
Switch Overview” configuration options available.
Chapter 2, “Installing the Install the System Image. This includes uploading the system image to a TFTP server,
System Image” deleting prior configuration or system files, saving a backup version of the existing
configuration, and uploading the system image file, and restoring the site
configuration file.
Chapter 3, “Configuring the Review details about the Command File, its syntax, options, specific settings, and an
WS5000 Series Switch example.
Automatically”
Chapter 4, “Using the Learn about working within the WS5000 Series Switch GUI to perform most daily
WS5000 Series Switch GUI” administration tasks for the switch and its associated devices.
Chapter 5, “Configuring User Configure the Radius server (for both User and Management authentication).
and Management
Authentication”
Chapter 7, “Configuring Configure rogue access port (an access port in the network that is not valid and might
Rogue AP Detection” be unsafe) detection.
Chapter 8, “CLI Command Review the CLI command reference for all configuration command details, for when
Reference” the administrator will use the CLI interface instead of the GUI interface.
Chapter 9, “Service Mode Review the CLI command reference for all the service mode command details for use
CLI” in debugging and problem resolution while troubleshooting the WS5000 Series
Switch configuration.
Chapter 10, “Antennas and Review antenna and power settings for numerous field installation demographics.
Power”
Chapter 11, “Converting AP- Convert the AP-4131 access point to WS5000 RF ports.
4131 Access Points to RF
Ports”
Chapter 15, “AP-300 Sensor Learn about the concepts and functionality of AP300 Sensor conversion.
Conversion”
xxvii
Chapter 16, “Syslog and See all the syslog and traps generated by WS5000 2.1.
Traps”
Appendix , “DOM Firmware Learn about the new DOM firmware upgrade implemented in this release.
Upgrade”
Appendix , “DTIM Interval per Learn about the new DTIM interval per BSS implemented in this release.
BSS”
Appendix , “AP300 LED Learn about the AP300’s LED color code functionality.
Codes”
Appendix , “Customer Contact the customer support department for any queries.
Support”
Annotated Symbols
Notational Conventions
The following notational conventions are used in this document:
• Italics are used to highlight specific items in the general text, and to identify chapters and sections in
this and related documents.
• Bullets (•) indicate:
• action items
• lists of alternatives
• lists of required steps that are not necessarily sequential
• Sequential lists (those describing step-by-step procedures) appear as numbered lists.
Service Information
If a problem with is encountered with the WS5000 Series Switch, contact Symbol Customer Support. See
Symbol’s Web site (http://www.symbol.com/services/online_support/online_support.html) for Symbol
Customer Support contact information and policies.
Note Before calling Symbol Customer Support, have the model number and serial
number for the WS5000 Series Switch on hand.
If the problem cannot be solved over the phone, you may need to return your equipment for servicing. If that is
necessary, you will be given specific directions.
Symbol Technologies is not responsible for any damages incurred during shipment if the approved shipping
container is not used. Shipping the units improperly can possibly void the warranty. If the original shipping
container was not kept, contact Symbol to have another sent to you.
WS5000 Series Switch Overview
The WS5000 Series Switch provides a centralized management solution for wireless networking components
across the wired network infrastructure. Unlike traditional wireless network infrastructures that reside at the
edge of a network, the switch uses centralized, policy-based management for all devices on the wireless
network.
The switch connects to the network through the Ethernet and a Layer 2 switch or hub. The access ports are
connected to a POE-enabled hub which is connected to a Layer 2 switch or hub on the network.
The switch functions as the center of the wireless network. The access ports function as radio antennas for
data traffic management and routing. All of the system configuration and intelligence for the wireless network
resides in the switch.
The switch uses access ports to bridge data from the associated wireless devices to the wireless switch. The
wireless switch applies policies to the data packets before routing them to their destinations. Data packets
destined for devices on the wired network are processed by the switch where appropriate policies are applied
before they are encapsulated and sent to their destination.
1-2 WS5000 Series Switch System Reference Guide
Access port configuration is managed by the switch through the Graphical User Interface (GUI) or the Command
Line Interface (CLI). A WS5000 Series Switch streamlines management of a large wireless system and allows
for network management features such as Quality of Service (QoS), virtual WLANs and packet forwarding.
• IP-Redirect VoIP
• Multicast support
• DFS/TPC jumbo packet
• Support for Proxy ARP statistics applet operation with Sun JRE
• Service mode features
• The WS5000 Series Switch GUI applet only supports Sun Java Runtime Environment (JRE) including the
Sun Java Virtual Machine (JVM). Support for the Microsoft Virtual Machine is discontinued with the 1.4
release and WS5000 Series Switch. This is an extension of the JRE support changes implemented in
1.4. The Sun JRE version support on Windows platforms is JRE 1.4.2_06 or greater. JRE 5.0 Update 2 is
recommended.
• Install surge protection. Use a surge protection device between the electricity source and the WS5000
Series Switch.
• Install an Uninterruptible Power Supply (UPS). A UPS provides continuous power during a power outage.
Some UPS devices have integral surge protection. UPS equipment requires periodic maintenance to
ensure reliability. A UPS of the proper capacity for the data processing equipment must be purchased.
Power On Self Test (POST) running All colors in rotation All colors in rotation
Error Codes
WS5000 Series Switch Overview 1-7
IPsource Source IP
IPdestination Destination IP
Note You can use WFQ to prioritize only UDP traffic along with the filters.
WFQ uses one queue for each classification group, up to eight queues total, and one queue for all other data.
For example, if the network has only one classification group for VoIP and no other groups, then WGQ
automatically uses two queues: one for VoIP and the other for all other data (data not defined in the
classification group). Each additional classification group uses another queue and keeps one queue open for
other data.
The allocation setting determines the percentage of available network bandwidth for data from a classification
group. For example, if the WFQ allocation for VoIP data is set to 80%, then the switch sends four packets of
VoIP data every one packet of other data during periods of network congestion.
WFQ is implemented for the different types of traffic on the same ESSID and Access Port (AP) as well as
between different ESSIDs on the same AP. This implementation shares voice and non-voice traffic across
different network paths, thereby balancing the traffic load. A large volume of non-voice traffic on one ESSID
does not deplete the voice traffic on another ESSID on the same AP.
When QoS is configured on the switch, users can select specific network traffic, prioritize it, and use
congestion management and congestion avoidance techniques to provide preferential treatment.
Implementing QoS on wireless LANs makes network performance more predictable and bandwidth utilization
more effective. The benefits of QoS become more obvious as the load on the wireless LAN increases, keeping
the latency, jitter, and loss for selected traffic types within an acceptable range.
WMM introduces traffic prioritization capabilities based on the four “Access Categories" (AC). In the default
configuration, the higher the access categories, the higher the probability to transmit.
The ACs were designed to correspond to 802.1d priorities to facilitate interoperability with QoS policy
management mechanisms, such as UPnP.
Table 1.4
Access Category Description 802.1d Tags
WMM Video Prioritize video traffic above other data traffic. 5,4
(AC 2) One 802.11g or 802.11a channel support 3-4 SD TV streams or 1 HDTV
stream.
WMM Best Effort Traffic from legacy devices, traffic from applications or device that lack 0,3
(AC 1) QoS capabilities.
Traffic less sensitive to latency, but effected by long delays, such as
internet browsing.
WMM Background low priority traffic (file downloads, print jobs) tat do not have strict 2,1
(AC 0) latency and throughput requirements.
AC Parameters
Packets are then added to one of four independent transmit queues (one per AC; i.e., voice, video, best effort,
or background) in the AP. The AP has an internal collision resolution mechanism to address collision among
different queues, which selects the frames with the highest priority to transmit. The same mechanism deals
with external collision, to determine which client should be granted the “Opportunity to Transmit” (TXOP).
The collision resolution algorithm that is responsible for traffic prioritization is probabilistic and depends on
two timing parameters that vary for each AC.
• The minimum interframe space, or Arbitrary Inter-Frame Space Number (AIFSN)
• The Contention Window (CW), sometimes referred to as the Random Backoff Wait.
Both values are smaller for high-priority traffic.
For each AC, a backoff value is calculated as the sum of the AIFSN and a random value from zero to the CW.
• The value of the CW varies through time.
• Initially the CW is set to a value that depends on the AC (CWmin)
After each collision, the CW is doubled until a maximum value (CWmax), also dependent on the AC, is reached.
• After successful transmission, the CW is reset to its initial, AC dependant value.
The AC with the lowest backoff value gets the TXOP.
• As frames with the highest AC tend to have the lowest backoff values, they are more likely to get a TXOP.
Once a client gains a TXOP, it is allowed to transmit for a given time depending on the AC and the PHY rate.
• TXOP limit ranges from 0.2 ms (background priority) to 3 ms (video priority) in an 802.11a/g network, and
from 1.2 ms to 6 ms in an 802.11b network.
• This bursting capability greatly enhances the efficiency for high data rate traffic, such as AV streaming.
• Also, the devices operating at higher PHY rates are not penalized when devices that support only lower
PHY rates (e.g. because of distance) contend for medium access.
battery power by sensing only for their specific BSS rather than all traffic. An access port with multiple BSSs
provides the same functionality as four single-BSS Access Points and requires less time for installation and
configuration.
Network administrators add WLANs to BSSs. The BSSIDs are mapped to ESSIDs by default. However, the
network administrator can optionally change default settings. The network administrator can map each BSSID
to multiple ESSIDs, so the radios on the access ports support multiple WLANs.
As RF traffic changes over time or the MU roams, the MU searches for access ports that have a matching
ESSID. The MU associates with an access port with the same ESSID to synchronize communication. As the
MU roams from coverage area to coverage area, it switches between access ports.
The MU switches between access ports when the MU analyzes the reception quality at a location and decides
to communicate with another access port based on the best signal strength and lowest MU load distribution.
The AP 100, AP 200, AP 300, AP 4121 and AP 4131 access ports support multiple ESSIDs.
Using VLANs:
• Limits broadcast and multicast traffic
• Increases security by limiting communication between groups
• Allocates network resources, such as servers, to specific groups
Map WLANs on a one-to-one basis, configuring switch policies such as:
• Ethernet Policy mapping one WLAN to a VLAN
• Access Port Policy mapping one or more WLANs to a BSSID
• Security Policy mapping one security policy to a WLAN policy.
1.4.1 WME
WME is quality of service implementation based on the subset of the IEEE 802.11e draft specification. WME
support will enable the wireless infrastructure network based on WS5000 to handle the multimedia traffic
with Quality of Service (QoS). WS5000 will be able to provide the enhanced service for WME capable stations
associated on access-Port that has the WME capability.
To learn more about WME refer to QoS via Wi-Fi Multimedia Extension (WME) on page 1-11.
1.4.2 RF Statistics
The switch shall support approximately 24 new MIB tables, giving various details of the RF statistics. The
purpose of these new (enhanced) statistics is to provide better RF monitoring and troubleshooting capabilities
to network administrators.
1-16 WS5000 Series Switch System Reference Guide
1.4.6 AP to AP Beacons
The purpose of this functionality is to measure and report the signal strength of beacons heard by each Portal
(radio) connected to the switch, periodically. Normally, any given Portal would hear beacons from at most all
the other Portals on its assigned channel. It may also hear beacons from 'nearby' Portals on adjacent channels.
This information will be reported by the switch as a new doubly-indexed table. The primary index is the
PortalIndex of the Portal that heard the beacons. The second index is the PortalIndex of the Portal from which
the beacons were heard. For each such combination, 7 pieces of data are tracked in a cumulative fashion,
(since switch reboot).
To learn more about AP to AP beacon, refer to Chapter 13, Neighboring APs.
the necessary traffic to the WIPS server that analyzes the network for any sort of unwanted traffic and protects
against various types of Denial of Service attacks.
The idea of using AP300 is to provide an easy to deploy system for intrusion detection / prevention re-using
existing hardware (typical WIPS systems require a dedicated, expensive sensor). The AP300 needs to be
converted to a "sensor" (with a special Firmware downloaded to it).
WS5000 v2.1 addresses the requirement to integrate the capability of converting a standard AP300 to a sensor
(and back as required) from the switch itself (and not have the administrators use a standalone tool to the do
the same).
To learn more about WIPS support, refer to Converting an AP300 into a Sensor on page 15-3.
Command Description
set dhcpsrv <enable | disable> Enables or disables the WS5000 Series Switch’s
internal DHCP server (for this NIC).
set dhcp_IP_Range startIP [ endIP ] Sets the DHCP server’s IP pool range. If endIP isn’t
supplied, the pool consists of the single startIP
address.
WS5000 Series Switch Overview 1-21
Command Description
set dhcp_DefLease <seconds> Sets the DHCP server’s default lease time, in seconds,
to seconds.
Note The default lease time is always less than or equal to the maximum lease time. If you set
the default lease time to be greater than the maximum lease time, the maximum lease time is
automatically reset to match the default. Conversely, if you set the maximum lease time to be
less than the default lease time, the default is reset to the (new) maximum.
set dhcp_MaxLease <seconds> Sets the DHCP server’s maximum lease time, in
seconds, to seconds.
set dhcp_DomainName <domain.suffix> Sets the DHCP server’s domain name; for example,
“symbol.com”. To clear the domain name, pass a NULL
argument.
set dhcp_PriDNS_IP <IP_address> Sets the IP address that the DHCP server will use as its
primary Domain Name System server. To clear the
primary DNS IP, pass a NULL argument.
set dhcp_SecDNS_IP <IP_address> Sets the IP address that the DHCP server will use as its
secondary Domain Name System server. To clear the
secondary DNS IP, pass a NULL argument.
set dhcp_Router_IP <IP_address> Sets the IP address that the DHCP server will use as its
router. To clear the secondary DNS IP, pass a NULL
argument.
set dhcp_PriVLAN_only <IP_address> Serves DHCP requests only on the primary VLAN for
the interface.
Subnet IP : 192.000.000.0
Netmask IP : 255.255.255.0
etc...
Note When you copy a dhcpd.conf file to the WS5000 Series Switch, the previous
version of the file (on the switch) is overwritten.
This chapter describes how to install a new system image with the latest software on the WS5000 Series
Switch. It also guides you through the CLI commands for restoring the site configuration file for the switch.
This chapter contains:
• Before Installing the Image
• Upgrading the Switch Software to 2.1
Note The WS5000 Series Switch Graphical User Interface does not support this
process.
After you log into the WS5000 series switch, it displays the software version. For example:.
user name: cli
Symbol Wireless Switch WS 5000 Series.
Please enter your username and password to access the Command Line
Interface.
userid: admin
password: ******
Retrieving user and system information...
Setting user permissions flags..
Checking KDC access permissions...
Welcome...
Creating the Event list...
System information...
System Name : WS5000
Description : WS5000 Wireless Network
Switch Location :
Software Ver. : 2.1.0.0-xxxR
Licensed to : Symbol Technologies
Copyright : Copyright (c) 2000-2006. All
rights reserved.
Serial Number : 00A0F8545254
Number of Licenses : 48
Max Access Ports : 48
Max Mobile Clients : 4096
MU Idle Timeout value : 1800 seconds
Active Switch Policy : symbol2006
Emergency Switch Policy : Not defined
Switch Uptime : 00d:00h:35m
Global RF stats : Disabled
# of Unassigned Access Ports : 0
CLI AutoInstall Status : Enabled
WS5000>
Table 2.1 lists the procedures to upgrade the WS5000 Series Switch to the latest software version (xxx):
Table 2.1 Procedure to Upgrade to 2.1-xxx
If Your Switch Version is To Update to 2.1-xxx
2.0.0.0-xxx Follow the procedures in Upgrading the Switch from 2.0 to 2.1 on page 2-4.
1.4.3.0-xxx Follow the procedures in Upgrading the Switch Software to 2.1 on page 2-3
Installing the System Image 2-3
1.4.2.0-xxx Follow the procedures in Upgrading the Switch Software to 2.1 on page 2-3
1.4.1.0.xxx Follow the procedures in Upgrading the Switch Software to 2.1 on page 2-3.
1.4.0.xxx Follow the procedures in Upgrading the Switch Software to 2.1 on page 2-3.
WS5100 1.1v49 Follow the procedures in Upgrading the Switch Software to 2.1 on page 2-3.
Note There are certain key combinations that might stop the WS5000 Boot Loader
(in 1.4.x.x baseline) so that it accepts user inputs. To avoid this, do no press any key
and do not enable the scroll lock on the serial console window when the upgrade or
downgrade is in progress.
Note You must run the PreUpgradeScript before you upgrade the switch.This is valid
only when you upgrade the switch from 1.4.x to 2.1
Note When ftping the PreUpgradeScript, the switch displays the error messages:
/bin/dedos: line 69: syntax error near unexpected
token 'dir'
script.
Just verify the size of the script ftp'ed matches with the actual one.
Note While running the PreUpgradeScript, you may encounter two problems.
Scenario 1: The switch may not have enough space to upgrade.
Scenario 2: The switch may ask you to upgrade the DOM firmware before upgrading.
Scenario 1
If there is not enough space for the upgrade procedure, the script displays:
SM-WS5000> launch -c /image/PreUpgradeScript freemem
Verifying dominfo Checksum
dominfo Checksum Verification Passed
checking type of DOM
Showing details of DOM
Model Number______________________: HYPERSTONE FLASH DISK
Serial Number_____________________: HyFlash 00002973
Controller Revision Number________: 14/05/02
Able to do Double Word Transfer___: No
Controller buffer size (bytes)____: 512
Transfer Speed____________________: Drive
Type________________________: IORDY Su
pported___________________: No
Can IORDY be disabled by device___: No
LBA Mode supported________________: Yes
DMA Supported_____________________: No
Number of ECC bytes transferred___: 4
Number of sectors per interrupt___: 1
Number of Cylinders_______________: 1004
Number of Heads___________________: 8
Number of Sectors per Track_______: 32
This is a Kouwell DOM which needs to check for the version of
DOM firmware
Checking DOM firmware
Verifying vdate Checksum
vdate Checksum Verification Passed
Current Firmware Version
Version Date: 040928b9
Dom Firmware up to date - Done
Finding out the Free Space Needed ... !!
Total Free Space on the System: 33 (in MB)
Not enough space to continue with upgrade ... !!
NOTE: Freeing up the space makes you committed for upgrade .. !!
2-8 WS5000 Series Switch System Reference Guide
Note If you do not wish to upgrade the firmware, then you can use the following
CLI command:
launch -c /image/PreUpgradeScript freemem nofwcheck
DMA Supported_____________________: No
Number of ECC bytes transferred___: 4
Number of sectors per interrupt___: 1
Number of Cylinders_______________: 1004
Number of Heads___________________: 8
Number of Sectors per Track_______: 32
This is a Kouwell DOM which needs to check for the version of
DOM firmware
checking DOM firmware
Verifying vdate Checksum
vdate Checksum Verification Passed
Current Firmware Version
Version Date: 011012b9
Need Dom Firmware Upgrade..Aborting upgrade
Please upgrade the DOM Firmware before upgrading
SM-WS5000>
Execute the following steps to upgrade the DOM firmware:
• Copy the WS5k_domfix.cfg file to the switch
SM-WS5000> copy ftp system -u ftpuser -m bin
Enter the file name to be copied from FTP server :
WS5k_domfix04.cfg
IP address of the FTP server : 111.111.111.111
Enter the user password : *******
Copying 'WS5k_domfix04.cfg' from ftp://111.111.111.111 to
Switch...
Data connection mode : BINARY (Connecting as 'ftpuser')
Status : Transfer completed successfully
12514 bytes received in 0.021 seconds (5.8e+02 Kbytes/s)
/bin/dedos: line 69: syntax error near unexpected token `dir'
/bin/dedos: line 69: `dedos -R <dir> # recursive from dir'
SM-WS5000>
• Enter the CLI service mode and execute the WS5k_domfix.cfg file.
SM-WS5000> exec
Executing CLI Service Mode command file ....
Enter the command file name: WS5k_domfix.cfg
Current firmware version
Version Date: 011012b9
Version Date: 011012b9
Need firmware upgrade
Note You cannot use tftp to acquire this image because the file size exceeds 32 MB.
Note If you do not wish to upgrade the firmware, use the following CLI command:
launch -c /image/PreUpgradeScript upgrade nofwcheck
Note You can also provide the image name a command line argument to the
PreUpgradeScript. If you do this, the script does not prompt for the image name.
Example:
launch -c /image/PreUpgradeScript upgrade<filename>
The switch reboots three times in approximately five minutes, and then displays the 2.1 image. The image has
the same configuration it had before the upgrade. The serial console displays the system logs.
The logs display the switch passing through each reboot state before it finally displays the 2.1 image. The
telnet or ssh window displays the logs until the switch reboots the first time.
Note Power cycling the system when any of these screens appears will cause an
unrecoverable error just like a power failure.
If any of the below two messages are displayed then press the escape key (ESC) to return to the boot selection
screen
Minimal BASH-like line editing is supported. For the first word,
TABlists possible command completions. Anywhere else TAB lists
the possiblecompletions of a device/filename. ESC at any time
exits.
grub>
or
kernel (hd0,0)/boot/vmlinuz-2.4.20_mvl31
console=ttyS0,19200 quiet
initrd (hd0,0)/boot/ramdisk.img
Note Save the current system configuration and image files on the network before
downgrading because after you downgrade the switch, it uses the default
configuration settings and the downgraded image files.
After you downgrade from 2.1 to 1.4.3/1.4.2/1.4.1/1.4.1/1.4.0 WS5000 Series Switch, the switch obtains the
following files:
• Running the PreDowngrade Script
• Running the Downgrade.exe Script
• Downgrading the Image Version.
Note If you use the PreDowngrade.exe script to release memory, you must
proceed with the downgrade.
Installing the System Image 2-15
Example
WS5000.(Cfg)> copy ftp system -u ftpuser -m bin
Enter the file name to be copied from FTP server : /home/
WS5x00Switch/builds/bf-2.1.0.0/R_BF_2.1.0.0-xxxR/
downgrade/PreDowngrade.exe
IP address of the FTP server : 111.111.111.111
Enter the user password : *******
Copying 'PreDowngrade.exe' from ftp://111.111.111.111 to
Switch...
Data connection mode : BINARY (Connecting as 'ftpuser')
Status : Transfer completed successfully
1059 bytes received in 0.0232 seconds (45617 bytes/s)
WS5000.(Cfg)>
SM-WS5000> exec
SM-WS5000>
exec <CR>
Executing CLI Service Mode command file ....
Enter the command file name: Downgrade.exe
5. Enter Downgrade<x.x.x.x-xxxR>.image as the image filename (<x.x.x.x-xxxR> corresponds to the
version to which you downgrade the switch from 2.0).
The switch is downgraded to the corresponding version.
Example
SM-WS5000> copy ftp system -u ftpuser -m bin
Enter the file name to be copied from FTP server : /home/
WS5x00Switch/builds/bf-2.1.0.0/R_BF_2.1.0.0-xxxR/
downgrade/Downgrade.exe
IP address of the FTP server : 111.111.111.111
Enter the user password : *******
Copying 'Downgrade.exe' from ftp://111.111.111.111 to
Switch...
Data connection mode : BINARY (Connecting as 'ftpuser')
Status : Transfer completed successfully
3500535 bytes received in 0.447 seconds (7823770 bytes/s)
SM-WS5000>
SM-WS5000>
There are two types of auto-install to configure the WS5000 Series Switch automatically:
1. DHCP Auto-install, performed as a part of WS5000 boot process
2. Manual Auto-install, performed by executing a CLI command. This requires a reboot.
After you extract the configuration file from the DHCP lease file, it downloads, parses, and configures the
WS5000 Series Switch
Note The command file is not invoked automatically using this method. The correct
method is to use the DHCP option to send the file to the switch.
AutoConfig Log <on|off> This selection allows the user to enable or disable the use of the
logging facility. The default is on.
TFTP Server <xxx.xxx.xx.xx> This is the TFTP server from where the configuration file, the
image file, and the Kerberos file are downloaded. If the TFTP
server is not specified, it is assumed that the user
downloaded these files manually via CLI copy command or the
auto install will look for them in the Wireless Switch.
ImageRestore <image file(.sys.img)> If the revision levels are different, then the image file will be
downloaded from the TFTP server. After this step has
completed successfully, the switch will perform a reset and
continue to reboot with the most recent (and valid) system
image available. If any error occurred during the file
processing, the firmware will not be upgraded and an error
message will be logged.
3-4 WS5000 Series Switch System Reference Guide
ConfigFile <config_name (.cfg)> This is the name of a WS5000 Series Switch configuration.
This file is downloaded automatically from a specified TFTP
server or though the CLI copy command.
If the file is not found, or if there were errors during the TFTP
download, the installation software will abort the
configuration immediately and exit. This is considered a fatal
error and any locally specific configurations should not be
applied as well since they can be interrelated to the general
configuration settings. The IP address of the WS will also
remain unchanged. The file name is case sensitive.
KerberosFile <kerberos_name (.krb)> This is the name of a Kerberos username/password (Kerberos
MIT DB file format) file and it is used to configure the primary
Kerberos database of the on board KDC server. The database
is completely flushed before the new principals are added.
If an error occurs during the file downloading or processing,
the installation software logs an error message and skips the
Kerberos configuration. The installation software tries to find
the file in the Wireless Switch.
If it is not there, it logs an error message and continues. Once
a Kerberos DB .krb file is provided for download and
installation, this new file replaces the current database file.
There is no automatic attempt to save the previous copy of
this file on the master KDC. The file name is case sensitive.
Eth1DNSServer1 <ip_address> DNS server configuration for each interface. Users can configure up
Eth1DNSServer2 <ip_address> to two DNS servers per interface. If it is not supplied, the DHCP
Eth2DNSServer1 <ip_address> configuration will be kept.
Eth2DNSServer2 <ip_address>
Gateway Default gateway. There should only be one value since the switch
currently does not allow gateway settings per interface. If this
configuration is not specified, the DHCP settings apply.
HostnamePrimary Hostname of Primary switch.
HostnameStandby Hostname of Standby switch.
Eth1PrimaryIP IP address of Primary switch.
Eth2PrimaryIP IP address of Primary switch.
Eth1StandbyIP
IP address of Standby switch.
Eth2StandbyIP
IP address of Standby switch.
If these IP addresses are not specified in the command file, the
DHCP settings are kept. When an image upgrade is performed, it
will not change the existing Ethernet configuration.
StandbyMgt Indicates whether Standby Management is on/off (enabled/
disabled).
If enabled, the installation software queries the database for the
number of licenses. If the switch is able to acquire a license, it may
become a Primary switch. If no license is available, it can only be
considered as a Standby switch.
3-6 WS5000 Series Switch System Reference Guide
NTPServer1 <NTP xxx.xxx.xx.xx> NTP server IP address (for the on-board KDC server). The
primary and standby switches need to be defined with the
same NTP service host to insure that the time source is
consistent.
NTPServer2 <NTP xxx.xxx.xx.xx> Second alternate NTP server IP address.
NTPServer3 <NTP xxx.xxx.xx.xx> Third alternate NTP server IP address or name.
KDCRealm <KDC realm name> Kerberos realm name
KDCInterface <KDC interface The interface on which the KDC is configured (1 or 2).
name>
Note All Security Policies which are configured for Kerberos Authentication will automatically
be populated with the Master/Slave/Remote server’s IP addresses if present in this file.
SNMPCommunity[1-4]Perm <RO | RW
permissions>
#############################################################################
#
# Copyright (c) 2005, Symbol Technologies, Inc.
# All rights reserved.
#
# cmd_template.sym file
#
# This is a template file to illustrate the format of auto configuration command files.
# The command file must end with the .sym extension and contain options to
# perform switch configuration. The format of the file is as follows:
#
# <option> <value> #comment
#
# Each line is composed of an option name and its value. All options are
# case sensitive.
#
# When this file is parsed, any option that is not found or has no value is ignored,
# which means that the switch will keep the current configuration for this option
# unchanged. The following lines are considered equivalent.
#
# #<option> <value>
# <option> #<value>
# <option> #some comment
#
#############################################################################
#############################################################################
# SECTION: Special Options #
#############################################################################
AutoConfigLog #on/off: Log errors and events to CmdProcErrors.txt
#Default is 'on'.
#############################################################################
# SECTION: Files to download #
#############################################################################
TFTPServer #tftp server where files are located
ImageRestore #image file (.sys.img)
ConfigFile #configuration file (.cfg)
KerberosFile #kerberos username/passwd (.krb)
#############################################################################
# SECTION: General Network Configuration and Standby Management #
#############################################################################
#
# DNS configuration
#
Eth1DNSServer1 #dns server
Eth1DNSServer2 #dns server
Eth2DNSServer1 #dns server
Eth2DNSServer2 #dns server
#
# Switch configuration
#
Eth1SubnetMask #subnet mask
Eth2SubnetMask #subnet mask
Eth1Domain #domain name
Eth2Domain #domain name
Eth1DHCP #on/off
Configuring the WS5000 Series Switch Auto- 3-9
Eth2DHCP #on/off
Gateway #default gateway
#
# Primary IP configuration
#
HostnamePrimary #Hostname of primary CC
Eth1PrimaryIP #ip address of primary CC
Eth2PrimaryIP #ip address of primary CC
#
# Standby IP configuration
#
HostnameStandby #Hostname of standby CC
Eth1StandbyIP #ip address of standby CC
Eth2StandbyIP #ip address of standby CC
#
# Enable or disable the standby management
#
StandbyMgt #on/off
#############################################################################
# SECTION: Kerberos Configuration #
#############################################################################
#
# NTP server configuration
#
NTPServer1 #NTP server 1
NTPServer2 #NTP server 2
NTPServer3 #NTP server 3
#
# Kerberos Master and Slave configuration
#
KDCRealm #kerberos realm
KDCInterface #Interface on which KDC is configured (1 or 2)
#
# Add a remote backup master
# (excluding the main Master/Primary & Slave/Standby from above)
#
KDCBackupHostname #Hostname of the backup slave
KDCBackupIP #IP address of backup slave
KDCBackupDomain #Domain of the backup slave
#
# NOTE: All Security Policies which are configured for Kerberos Authentication
# will automatically be populated with the Master/Slave/Remote servers IP
# addresses if present in this file.
#
#############################################################################
# SECTION: SNMP Configuration #
#############################################################################
#
# SNMP community attributes
#
SNMPCommunity1 #SNMP community name
SNMPCommunity1IP #IP address for the community
SNMPCommunity1Perm #RO/RW: Access permissions
#
# SNMP Traps
#
SNMPCommunity1Trap #SNMP community trap
SNMPCommunity1TrapIP #SNMP community trap IP
#############################################################################
# SECTION: SYSLOG Configuration #
#############################################################################
#
# Syslog severities
#
# Name Number
#----------- --------
# Emergency 1
# Alert 2
# Critical 3
# Error 4
# Warning 5
# Notice 6
# Info 7
# Debug 8
#
# Syslog host 1
#
SysLogHostname1 #Hostname of syslog collector
SysLogIP1 #IP address of syslog collector
SysLogSev1 #Enter a list of severity numbers
#separated by white spaces EX: 2 3 6 8
#
# Syslog host 2
#
SysLogHostname2 #Hostname of syslog collector
SysLogIP2 #IP address of syslog collector
SysLogSev2 #Enter a list of severity numbers
#separated by white spaces EX: 2 3 6 8
#
# CLI Commands Section
#
#Example CLI Commands
CLI#
CLI#
CLI#
CLI#
Configuring the WS5000 Series Switch Auto- 3-11
Note The following file must be available on the TFTP server before beginning the upgrade process
using Auto Install:
WS5000_v2.0.0.0-034R.sys.img (should be in the TFTP server)
Cmd_template.sym (Should be in the TFTP Server)
5. Enter the patch filename when the system prompts. The switch installs the patch file.
6. Before the reboot ensure that the FTP root directory contains the following:
• PreUpgradeScript
• vdate
• dominfo
• WS5000_v2.1.0.0-xxx.sys.kdi
7. Reboot the switch.
As part of boot up process, the auto-install begins.
The DHCP server provides the TFTP server IP and command filename. The command file is present on TFTP
server and it should contain the following name - value pairs for the upgrade.
FTPServer <ftp_server_ip_address>
FTPUser<ftp_user_name>
FTPPassword<ftp_user_password>
UpgradeFile<upgrade_file_name_present_on_the_ftp_server>
The upgrade file is the. sys.kdi file in the ftp user home directory on the ftp server.
If you enter all of these parameters, the switch upgrades successfully.
Configuring the WS5000 Series Switch Auto- 3-13
# Go to Config context
CLI#cfg
#############################################################################
#TFTP Server Certificate to be installed for RADIUS server
#############################################################################
#############################################################################
#Install Server Certificate to be installed for RADIUS server
#WS5000 is the password used while generating this certificate
#############################################################################
CLI#aaa
CLI#eap
CLI#import servcert cert-srv.pem
CLI#WS5000
CLI#import cacert cacert.pem
CLI#..
CLI#..
#############################################################################
#create a security policy.
#this example uses WEP and 802.1x authentication using Onboard RADIUS server
#shared secret to be used is WS5000
#############################################################################
CLI#securitypolicy
3-16 WS5000 Series Switch System Reference Guide
CLI#add aaasecuritypolicy
CLI#set encryption wep40 enable
CLI#2
CLI#157.235.208.234
CLI#1812
CLI#WS5000
CLI#set radius server 1 127.0.0.1
CLI#..
CLI#..
#############################################################################
#create a WLAN. Use the security policy that was created above
#############################################################################
CLI#wlan
CLI#add aaawlan aaawlan
CLI#set security aaasecuritypolicy
CLI#..
CLI#..
#############################################################################
#Create an APPolicy. Add this WLAN
#############################################################################
CLI#appolicy
CLI#add aaaappolicy
CLI#add aaawlan
CLI#..
CLI#..
#############################################################################
#Create a Switch Policy. Use APPolicy and EtherPolicy created above.
#Set Country to US
#Activate this Switch Policy
#############################################################################
CLI#switchpolicy
CLI#add aaaswitchpolicy
CLI#set appolicy aaaappolicy
CLI#set etherpolicy aaaetherpolicy
CLI#set adoptionlist a default allow aaaappolicy
CLI#set adoptionlist b default allow aaaappolicy
CLI#set adoptionlist g default allow aaaappolicy
CLI#set adoptionlist fh default allow aaaappolicy
CLI#set country us
CLI#yes
CLI#..
CLI#..
CLI#set switchpolicy aaaswitchpolicy
#############################################################################
# AAA Configuration
# Add AAA users
# aaauser0, aaauser1, aaauser2 .....
# passwords for all are aaaaaa
# CLI prompts for the passwords twice.
#############################################################################
CLI#aaa
CLI#userdb
CLI#user
CLI#add aaauser0
CLI#aaaaaa
CLI#aaaaaa
CLI#add aaauser1
CLI#aaaaaa
CLI#aaaaaa
CLI#add aaauser2
CLI#aaaaaa
CLI#aaaaaa
CLI#add aaauser3
CLI#aaaaaa
Configuring the WS5000 Series Switch Auto- 3-17
CLI#aaaaaa
CLI#add aaauser4
CLI#aaaaaa
CLI#aaaaaa
CLI#..
#############################################################################
#Add a RADIUS Group
#############################################################################
CLI#group
CLI#add aaagroup
CLI#..
#############################################################################
# Add aaauser0 to this created group
#############################################################################
#############################################################################
# Set this access policy for this Group to allow the WLAN
#############################################################################
CLI#policy
CLI#add wlan aaagroup aaawlan
CLI#..
#############################################################################
#Issue Save command to save these configurations
# Start the RADIUS server using "enable"
#############################################################################
CLI#save
CLI#enable
CLI#..
CLI#bye
You can configure the WS5000 switch and access ports using one of the following methods:
• The GUI through a web browser
• SNMP commands
• CLI from a Telnet connection through the wireless switch console port or a secure shell (SSH)
application.
However, not all areas of the system can be configured solely by the GUI, CLI, or SNMP.
If you need to use a specific interface for a system configuration, this is specified at the beginning of the
configuration process. For information on using the CLI, see Chapter 8, CLI Command Reference.
4-2 WS5000 Series Switch System Reference Guide
4.1 Logging In
To log into the WS5000 Series Switch graphical user interface:
1. Open a compatible browser.
2. Connect to the WS5000 Series Switch by typing https:// and the switch’s IP address. The WS5000
GUI Login Page is displayed.
3. Type a User ID and Password and click the Login button. The default is “admin” and “symbol”,
respectively.
Use the WS5000 Series Switch GUI (graphical user interface), the command line interface, or SNMP to
configure the onboard KDC. To configure the KDC via the former, perform the steps in the following sections:
1. Configuring Master KDC Information on page 4-3
2. Setting Kerberos Time Synchronization on page 4-6 (optionally)
3. Creating Kerberos User Accounts on page 4-5
4. Configuring Slave KDC Information on page 4-4 (optionally)
Note If using a master and slave switch configuration, ensure that each switch is
named appropriately (using the CLI) in order to avoid two devices with the same
name on the network.
4. By default, “ethernet1” is selected as the wireless switch’s interface that connects to the wireless
traffic. You can also select “ethernet2” if required.
5. Click Save to complete the Master KDC setup.
3. Click Add to complete adding the slave to the master KDC. The KDC Add Slave dialog box appears.
Note Click the Synchronize Database button to force the Master KDC to push its
database to the selected slave (even though the database is automatically
synchronized whenever you make a change such as adding a KDC user).
2. Select New User in the left panel, and configure the user account details as described in Table 4.1,
Table 4.1 Kerberos User Administration Field Descriptions
Field Description
Name A unique (1-20 characters) value that corresponds to the name of the user being
added to or removed from the Key Distribution Center (KDC).
Ticket Life (min) The minimum lifetime of a ticket (value ranges from 1-600 minutes).
3. When done, click Save to save the new Kerberos user account information.
2. Enter the IP addresses for the Preferred Time Server, the First Alternate Time Server, and the
Second Alternate Time Server. The alternate servers are optional, but recommended.
3. Click Save to apply settings.
4-8 WS5000 Series Switch System Reference Guide
Configuring User and Management
Authentication
The WS5000 Series Switch provides an integrated Radius server as well as the ability to work with External
Radius and LDAP servers to provide user database information and user authentication. Management users
may also be authenticated using external/integrated RADIUS server. The External Radius server cannot be
completely configured through the tools provided by the wireless switch, refer EAP Authentication Settings on
page 6-44 to configure an External Radius server. This association remains unused unless the Radius server
also adds the external switch as a client.The WS5000 Series Switch provides:
• Configuring an On-board RADIUS Server (Internal Radius server)
• Configuring Management User Authentication
• Configuring Remote RADIUS Server (External Radius server), refer EAP Authentication Settings on page
6-44.
• Configuring Windows Server 2000, provides you information about - How to Configure Windows 2000
Server.
5-2 WS5000 Series Switch System Reference Guide
1. Use the Data Source drop-down menu to select the data source for the local Radius server.
• If you select Local, the internal User Database serves as the data source. Refer to the Users screen
to enter the user data. For more information, see
Configuring Radius Users on page 5-12.
• If you select LDAP, the switch uses the data in an LDAP server. Configure the LDAP server settings
on the LDAP screen under Radius Server on the menu tree. For more information, see Configuring
LDAP Authentication on page 5-7.
2. Use the Default EAP Type drop-down menu in the TTLS/PEAP Configuration field to specify the
EAP type for the Radius server. The options are PEAP and TTLS.
• Protected EAP (PEAP) uses a TLS layer on top of EAP as a carrier for other EAP modules. PEAP is an
ideal choice for networks using legacy EAP authentication methods.
• Tunneled TLS EAP (EAP-TTLS) is similar to EAP-TLS, but the client authentication portion of the
protocol is not performed until after a secure transport tunnel has been established. This allows
EAP-TTLS to protect legacy authentication methods used by some Radius servers.
3. Specify an EAP Authentication Type from the drop-down menu in the TTLS/PEAP Configuration
field. The authentication type for PEAP are GTC and MSCHAP-V2. The authentication type for TTLS
are PAP, MD5 and MS-CHAP-V2
• EAP Generic Token Card (GTC) is a challenge handshake authentication protocol that uses a
hardware token card to provide the response string.
• Microsoft CHAP (MSCHAP-V2) is an encrypted authentication method based on Microsoft's
challenge/response authentication protocol.
5-4 WS5000 Series Switch System Reference Guide
• PAP provides a simple method for a remote node to establish its identity using a two-way
handshake. After the PPP link establishment phase is complete, a username and password pair is
repeatedly sent by the remote node across the link (in clear text) until authentication is
acknowledged, or until the connection is terminated
• MD5 provides a simple method for a remote node to establish its identity using a two-way
handshake. After the PPP link establishment phase is complete, a username and password pair is
repeatedly sent by the remote node across the link (in clear text) until authentication is
acknowledged, or until the connection is terminated
4. Click one of the following buttons in the screen:
6. Select the corresponding request ID for the server certificate and the CA certificate ID.
7. Click Apply.
The menu displays the certificates imported to the switch. You can also choose an imported CA
Certificate to use on the Radius server. If you use a server certificate signed by a CA, you must import
that CA's root certificate using the CA certificates screen from the Certificate Management menu.
Figure 5.6 Uploading CA Certificate
1. Configure the LDAP Configuration field to enable the switch to work with the LDAP server. Consult
with the LDAP server administrator for details on how to set the values if necessary.
Server name Enter the name of the external LDAP server acting as the data source for the
Radius server.
LDAP Server IP Enter the IP address of the external LDAP server. The server must be
accessible from the WAN port or from an active subnet on the switch.
Port Number Enter the TCP/IP port number for the LDAP server acting as a data source.
The default port is 389.
Bind DN Specify the Bind Distinguished Name —the distinguished name to bind with
the LDAP server.
Base DN Specify a distinguished name that establishes the base object for the search.
The base object is the point in the LDAP tree at which to start searching.
Pass Attribute Enter the password attribute used by the LDAP server for authentication.
Login Attribute Enter the login attribute used by the LDAP server for authentication. In most
cases, the default value in this field should work.
Filter Specify the filters used by the LDAP server.
Password Enter a valid password for the LDAP server.
Configuring User and Management Authenti- 5-9
Group Name Specify the name of the group sent to the LDAP server.
Membership Specify the Group Member Attribute to be sent to the LDAP server when
Attribute authenticating users.
3. Use the Add button to add more entries into the Clients Configuration table. Use the Delete button
to remove entries.
4. Click one of the following buttons in the screen:
Note Accounting files cannot be viewed from the switch. They have to be
downloaded to a TFTP server for viewing. Downloading the accounting file is
currently supported only through CLI.
Each user created is assigned a unique password and is associated with one or more groups. Each group can
be configured for its own access policy within the Access Policy configuration screen under the Radius Server
menu.
Configuring User and Management Authenti- 5-13
For each proxy server, the WS5000 enables the administrator to configure the following:
• Radius authentication server IP address
• Radius authentication server port
• Secret key
• Suffix of the user ID such as isp2.com or company.com
The WS5000 supports five proxy servers.
3. Microsoft Windows Server 2000 (or Advanced Server) with SP4 or (newer)
4. Experience with Microsoft Windows operating systems and the WS5000
Note It is possible to use the Wireless Switch User Authentication via Remote RADIUS
Server feature with different configurations than what’s provided in this guide.
However, to complete all of the steps in this installation guide the exact configuration
above must be used.
For this installation, Windows Server 2000 must be accessible by the WS5000. The simplest way to achieve
this is to configure the WS5000 and Windows Server 2000 so they are on the same physical and IP subnet. If
they are on different IP subnets, the WS5000 must be able to route to the Windows Server 2000.
Configuring User and Management Authenti- 5-17
2. Select the RADIUS Authentication tab. Check the Network Users (Web, Telnet, etc.) check box.
Enter the IP address of the Windows Server 2000 for the Primary Name / IP Address. Enter a Shared
Secret for the Primary. You will need to remember the Shared Secret when configuring the Windows
Server 2000. Click Close.
5-18 WS5000 Series Switch System Reference Guide
dn: o=SYMBOL,c=INDIA
objectclass: organization
o: SYMBOL
dn: cn=group6,o=SYMBOL,c=INDIA
objectclass: groupOfNames
member: cn=srijith,o=SYMBOL,c=INDIA
member: cn=apar,o=SYMBOL,c=INDIA
cn: group6
o: SYMBOL
dn: cn=srijith,o=SYMBOL,c=INDIA
objectclass: person
objectclass: uidObject
cn: srijith
sn: srijith
uid: srijith
userPassword: test
dn: cn=wvpnuser,o=SYMBOL,c=INDIA
objectclass: person
objectclass: uidObject
cn: wvpnuser
sn: wvpnuser
uid: wvpnuser
userPassword: test
Note There should be a group configured in the AAA server local database with the
same group name as in LDAP server. The policy in AAA server for this group should
contain the EAP enabled WLAN.
2. Use the following command for LDAP Configuration in switch for Openldap. This is valid only for VPN
CLIENTS.
LDAP Server IP : 192.192.4.42
LDAP Server Port : 389
LDAP Bind DN : cn=Manager,o=symbol,c=India
LDAP Base DN : o=symbol,c=India
LDAP Login : (uid=%{Stripped-User-Name:-%{User-Name}})
LDAP Password : userPassword
LDAP Group Name Attribute : cn
LDAP Group Membership Filter : (cn=wwvpnuser)
LDAP Group Membership Attribute :
LDAP Passwd : secret
Note This auth will work only if the username is not present in any group's available @
LDAP server
Note Only the default PAP encryption type is supported when a user is created in the
Active directory on Windows server. To select all the other encryption, go to the User
Properties > Account Information and select Store User Password in Reversible
Encryption checkbox.
Configuring User and Management Authenti- 5-21
2. This will open Windows 2000 Configure Your Server. Select Active Directory from the left side menu.
Configuring User and Management Authenti- 5-23
4. This will open the Welcome to the Active Directory Installation Wizard. Click Next >.
8. Enter a Full DNS name for new domain. Click Next >.
9. The Domain NetBIOS name will be entered by the Wizard. Click Next >.
Configuring User and Management Authenti- 5-27
10. Keep the default locations for the Database and Log. Click Next >.
11. Keep the default location for the Folder. Click Next >.
5-28 WS5000 Series Switch System Reference Guide
13. If you get the alert, you may be asked to configure a DNS server. Select No. Click Next >.
Configuring User and Management Authenti- 5-29
14. Use the default permission selected by the Wizard. Click Next >.
If you have not installed Active Directory, go to 5.5.1 Installing Active Directory on page 22
1. To configure Active Directory users, go to the Start Menu, select Programs > Administrative Tools
> Active Directory Users and Computers.
2. This will open the Active Directory Users and Computers. Select a domain from the tree menu on the
left side. Right click on the Users object and select New > User.
Configuring User and Management Authenti- 5-33
3. Enter a First name, Last name and User logon name. You will need to remember this User logon name
when you log into the wireless switch. Click Next >.
4. Enter a Password and Confirm password. You will need to remember this password when you log into
the switch. Click Next >.
5-34 WS5000 Series Switch System Reference Guide
5. Click Finish.
6. Right click on the Active Directory User you’ve just created and select Properties.
Configuring User and Management Authenti- 5-35
2. This will open Internet Authentication Service. From the Tree, right-click Clients and select New
Client.
Configuring User and Management Authenti- 5-41
3. Enter a Friendly name. We suggest you to use the name of the wireless switch that you configured in
Step 3. Keep Protocol as RADIUS. Click Next >.
4. Enter the IP address of the switch configured in Step 3. Enter a Shared Secret and confirm. Click
Finish.
5-42 WS5000 Series Switch System Reference Guide
5. From Internet Authentication Service, right-click on Remote Access Policies and select New
Remote Access Policy.
7. Click Add.
8. Select an Attribute type. If you are not sure which Attribute type to select, go to Windows-Groups.
Click Add…
5-44 WS5000 Series Switch System Reference Guide
11. This will add Domain Users to the selected groups list. Click OK.
16. Click on the Authentication tab. Select Unencrypted Authentication (PAP, SPAP). Unselect all
other authentication methods. Click OK.
5-48 WS5000 Series Switch System Reference Guide
21. Enter 3135 for Hexadecimal attribute value:. This value grants full administrative permissions to an
authorized user. Click OK.
27. Click Finish. This completes the configuration of Internet Authentication Service.
5-54 WS5000 Series Switch System Reference Guide
2. After successfully logging into the WS5000, check the local logfile for authentication details.
Note To see this message, event 39 (Mgt user auth success [radius]) must be enabled
for the local logfile.
3. Check the Event Viewer on the Windows Server 2000. From the System Log, open the properties for the
IAS source, information event.
Configuring User and Management Authenti- 5-55
A network policy is a “packet filter.” It prioritizes packets as they are sent across the wireless network, and
ultimately reject packets completely. Network policies define what packets should be filtered inbound (input)
and outbound (output) based on Input and Output Network Policies.
Network policies should be created to implement QoS and types of service (ToS) protocols. See Quality of
Service on page 1-9 for more details on QoS and types of service protocols supported by the WS5000 Series
wireless switch.
The data from Access Port directed towards MU is governed by outbound Policy Object and the data from an
MU directed to an Access Port is governed by inbound Policy Object.
Access Port policies use network policies (see Creating a Network Policy on page 6-13), but prior to creating a
network policy, other network related components and policies must be configured within the switch. These
are:
• Classifiers
• Classification Groups
See the following sections for more details on working with Network Policies:
• Classifiers on page 6-2
• Classification Groups on page 6-5
• Creating a Network Input Policy on page 6-9
• Creating a Network Output Policy on page 6-11
• Creating a Network Policy on page 6-13
• Modifying a Network Policy on page 6-38
6.1.1 Classifiers
A Classifier is a declaration that tests various aspects of a network packet and the path it travels along;
aspects such as source and destination IP, transport protocol, and so on.
A packet will either “pass” or “fail” the predicate. The action taken when a packet passes or fails a Classifier
is not included in the Classifier definition; the action is defined by a Classification Group (see Classification
Groups on page 6-5).
To see the configuration hierarchy while creating a Classifier, click Where Am I? at any point.
A Where Am I? Dialog Box, such as Figure 6.2, is displays.
Configuring Policies 6-3
2. Enter a name and description for the new WLAN, then if desired, select Use an existing Classifier as
a template.
3. Click Next. A panel for defining match criteria for the classifier is displayed.
6-4 WS5000 Series Switch System Reference Guide
Each row of the Match Criteria table is a simple declaration. For each Criteria type to be defined, a value
must also be defined. Unless otherwise noted, the Classifier uses a case-insensitive comparison when
evaluating network packet values.
Create a classifier(s) by referring to Table 6.1 which describes the meanings and acceptable values
ranges for the criteria types.
Table 6.1 Classifier Types and Acceptable Value Ranges
Criteria Type Description
Source Mac Address When evaluating the packet, the Classifier looks at the MAC address of the device
that sent the packet. The value is an arbitrary MAC address in the usual form.
Duplet-separating colons are inserted as you type.
Dest[ination] Mac Address MAC address of the device to which the packet is being sent. Arbitrary MAC
address in the usual form. Duplet-separating colons are inserted as you type.
Ethertype Ethernet type values, as defined by RFC 1700. Select pre-defined values 0x800
(IPv4) or 0x400 (nixdorf), or select and enter a hex number (with prefix “0x”) in the
text field to the right.
VLAN ID ID of the VLAN to/from which the packet is being sent/has been received. The
value is a number (only).
Protocol Ethernet protocol. Choose from one of the pre-defined protocol constants, or type
in the number (only!) of the desired protocol.
Source IP Address The IP address and subnet mask of the device where the packet emerged. The
values are expressed as two dot-separate IP addresses separated by a a single
forward-slash (/). For example: IPaddress/SubnetMaskAddress
Dest[ination] IP Address IP address and subnet mask of the device to which the packet is being sent. The
value is expressed in the same manner as Source IP Address.
Configuring Policies 6-5
Source Port The Ethernet port number, on the originating device, through which the packet
was sent.
Dest[ination] Port The Ethernet port number, on the recipient device, to which the packet is being
sent.
Multicast Mask MAC address that's used to mask the range of recipients of a broadcast packet.
This is particularly useful for restricting the broadcast of voice and video data.
4. If the predicate for the classifier has more than one clause, the Action conjunction is used to string
predicates together. For example,
• If the consecutive criteria are dissimilar, the predicates are conjoined with “AND”.
• If the consecutive criteria are similar, the predicates are conjoined with “OR”.
Predicates are evaluated and conjoined consecutively. In other words, there is no control over the
grouping of predicates other than logical ordering upon creating them.
Note Keep Classifier predicates as simple as possible, and build more complicated
tests by combining Classifiers in a Classification Group.
Use the Add or Remove buttons to add a new predicate or remove an existing predicate from a
Classifier.
5. When done, click Next. A Classifier Created Successfully! message panel is displayed.
6. Click Finish to save the new classifier and exit the wizard.
See the following sections for more details on working with Classification Groups:
• Creating a Classification Group on page 6-6
• Modifying a Classification Group on page 6-7
2. Enter a name and description for the new classification group, then if desired, select Use an existing
Classification Group as a template.
3. Click Next. A panel for adding classifiers to the group is displayed.
Configuring Policies 6-7
4. Select from among the Available Classifiers and then click the >> button to move to the Selected
pane.
5. Select an action for each Classifier added to the Selected pane.
• allow – For classifiers with an allow action, packets that pass through the Classifier are allowed
to continue and they are marked as being part of the Classification Group (this is important, since
Input and Output Policies filter packets based on Classification Groups).
Packets that do not pass the evaluation are not immediately thrown away. They are allowed or
denied according to the default action defined in the Input or Output Policy that uses this
Classification Group.
• deny – Packets that have this action associated with the Classifier are thrown away. Packets that
do not pass are allowed to continue (with no Classification Group marking).
6. When done, click Next. A Classification Group Created Successfully! message panel is displayed.
7. Click Finish to save the new Classification Group and exit the wizard.
2. This panel lists all available Classification Groups configured on the system. Table 6.2 describes the
fields and options within this panel. To edit a classification group, select the its name in the left pane
first.
Table 6.2 Classification Group Manager Fields and Controls
Field or Control Description
Tree View This expandable tree lists the classification group selected as well as the classifiers that
make up that group.
Properties Displays a list of classifiers within the classification group. Clicking Properties with a
classifier selected launches a new panel displaying the rules for the selected classifier.
Create Launches the Classification Group Wizard to create a new classification group. See
Creating a Classification Group on page 6-6 for more details.
Delete Removes the selected classification group from the system. A dialog appears to confirm
this action.
Edit Opens a variation of the Classification Group Wizard, for editing it in the same fashion
that it was created. See Creating a Classification Group on page 6-6 for more details.
Close Closes the Classification Group Manager without saving any changes.
3. When done, click Next. A Classification Group Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Classification Group and exit the wizard.
5. Click Close in the Classification Group Manager panel.
Configuring Policies 6-9
2. Enter a name and description for the new Input Policy, then if desired, select Use an existing Input
Policy as a template.
3. Click Next. A panel for adding Classification Groups to the Input Policy is displayed.
Figure 6.10 Creating a Network Input Policy—Adding Classification Groups
4. Select from among the Available Classifier Groups and then click the >> button to move a group(s) to
the Selected pane, and to apply it to the Input Policy.
6-10 WS5000 Series Switch System Reference Guide
To create a new Classification Group, click Create. See Creating a Classification Group on page 6-6 for
more details.
5. Click Next. A panel for applying prioritization actions to each chosen classification group is displayed.
Figure 6.11 Creating a Network Input Policy—Applying Prioritization to Chosen Classification Group
Table 6.3 describes the Input Policy classification group prioritization and IP redirection options.
Table 6.3 Input Policy Classification Group Prioritization and IP Redirection Options
Parameter or Control Description
Classification Group Tree The tree on the left shows the Classification Groups (CG) added to the Input
Policy. Select a group before modifying the actions and packet prioritization
associated with a group.
Default Action Is... Sets the action performed on all packets that are neither rejected by nor marked
as being part of a CG. Packets can either be allowed to continue along the
network, or be denied (and thus, thrown away).
Packet Marking Tab Set the ToS (Type of Service) bits and set the Tx Priority packet as Data or Voice
(voice gets higher priority than data). To enable these markings, check the
Enable box.
6. When done, click Next. An Input Policy Created Successfully! message panel is displayed.
7. Click Finish to save the new Input Policy and exit the wizard.
Configuring Policies 6-11
2. Enter a name and description for the new Output Policy, then if desired, select Use an existing Output
Policy as a template.
3. Click Next. A panel for adding Classification Groups to the Output Policy is displayed.
Figure 6.13 Creating a Network Output Policy—Adding Classification Groups
4. Select from among the Available Classifier Groups and then click the >> button to move a group(s) to
the Selected pane, and to apply it to the Output Policy.
6-12 WS5000 Series Switch System Reference Guide
To create a new Classification Group, click Create. See Creating a Classification Group on page 6-6 for
more details.
5. Click Next. A panel for applying prioritization actions to each chosen classification group is displayed.
Figure 6.14 Creating a Network Output Policy—Applying Prioritization Actions to Chosen Classification
Group
Table 6.4 describes the Output Policy classification group prioritization and weighted fair queuing
options that can be set.
Table 6.4 Output Policy Classification Group Prioritization and WFQ Options
Parameter or Control Description
Classification Group Tree The tree on the left shows the Classification Groups (CG) added to the Input
Policy. Select a group before modifying the actions and packet prioritization
associated with a group.
Default Action Is... Sets the action performed on all packets that are neither rejected by nor marked
as being part of a CG. Packets can either be allowed to continue along the
network, or be denied (and thus, thrown away).
Packet Marking Tab Set the ToS (Type of Service) bits and set the Tx Priority packet as Data or Voice
(voice gets higher priority than data). To enable these markings, check the
Enable box.
This is where you implement QoS (Quality of Service). For more details refer 1.3.4.3 Weighted Fair
Queuing (WFQ) on page 11
6. When done, click Next. An Output Policy Created Successfully! message panel is displayed.
7. Click Finish to save the new Output Policy and exit the wizard.
Configuring Policies 6-13
2. Enter a name and description for the new Network Policy, then if desired, select Use an existing
Network Policy as a template.
Note Currently, the interface type is always “Access Port”. That said, the Input
Policy evaluation is performed by the switch before it sends a packet (received from
a wireless device).
4. When done, click Next. A panel for selecting an Output Policy is displayed.
Output Policies define how to filter outgoing packets. Select an Output Policy, or to create a new Output
Policy, click Create... See Creating a Network Output Policy on page 6-11 for more details.
Figure 6.17 Creating a Network Policy—Selecting an Output Policy
5. When done, click Next. A Network Policy Created Successfully! message panel is displayed.
6. Click Finish to save the new Network Policy and exit the wizard.
Note This command is followed by prompts to enter the type of authentication (EAP
vs. Pre-Shared Key) and information about the key. NetLink Wireless Telephones only
support Pre-Shared Key (PSK) for WPA and WPA2 security.
2. Highlight Ethernet 2, check the 802.1q Trunk, select the Primary VLAN then click Apply.
Note The Primary VLAN is dictated by the connecting wired switches port settings.
In this example the connected ports native VLAN is 4. The Primary VLAN will vary
based on your installation.
6-18 WS5000 Series Switch System Reference Guide
Figure 6.34 WLAN Wizard initiating the creation of the Security policy to be used
24. Name the Security Policy; choose the encryption method that meets you organization's security
requirements and click Next.
28. Click the down arrow next to the Security Policy; select the newly created Security Policy and click
Next.
29. Click Finish.
Figure 6.40 Mapping the newly created WLAN to the wired VLAN
31. Click the down arrow for NIC 2; select the newly created WLAN and click Next.
32. Click Finish.
33. Click OK in Ethernet Policy completion information dialog box.
Figure 6.41 Adding the newly created Ethernet Port Policy to the Wireless Switch Policy
6-30 WS5000 Series Switch System Reference Guide
34. Click on the down-arrow next to the Ethernet Port Policy; select and click the newly created Ethernet
Port Policy; click Next.
Figure 6.44 Adding the newly created WLAN to the Access Port Policy
39. Assign the newly created WLAN its own ESSID; click Next.
40. Click the down-arrow next to the Spectralink WLAN; highlight and click the Spectralink Network
Policy; click Next.
41. Click the AP300a,300g,200b,4121,4131 tab; allocate 70 percent bandwidth to the SpectralinkWLAN;
click Next.
42. Click the 802.11g tab, change the DTIM to 3; leave the 1, 2, 5.5, 11 rates at Basic and others at
Supported; Beacon and RTS should be left at the defaults of 100 and 2347 respectively; click Next.
43. Click Finish.
Figure 6.49 Adding the newly created Access Port Policy to the Wireless Switch Policy
6-34 WS5000 Series Switch System Reference Guide
44. Highlight the newly created Access Port Policy; click >>.
Figure 6.50 Finishing adding the Access Port Policy to the Wireless Switch Policy
Figure 6.53 Default Access Port Policy that will be adopted by unknown access ports
6-36 WS5000 Series Switch System Reference Guide
50. Click the down-arrow next to Policy Name; highlight and click the newly created Wireless Switch
Policy; click Apply.
51. Click OK in the Wireless Switch Policy activation warning.
Configuring Policies 6-37
52. Click OK in the Wireless Switch Policy activation confirmation dialog box.
2. This panel lists all available Network Policies configured on the system. Table 6.5 describes the fields
and options within this panel. To edit a policy, select the policy name in the left pane first.
Table 6.5 Network Policy Manager Fields and Controls
Field or Control Description
Input Policy Tree view of the Classification Groups and Classifiers in the Input policy for the selected
Network Policy.
Output Policy Tree view of the Classification Groups and Classifiers in the Output policy for the selected
Network Policy.
Properties Displays information about the selected Input Policy, Output Policy, Classification Group
or Classifier, depending on what is selected/highlighted in the tree.
Create Launches the Network Policy Wizard to create a new Network Policy. See Creating a
Network Policy on page 6-13 for more details.
Delete Removes the selected policy from the system. A dialogue appears to confirm this action.
Edit Opens a variation of the Network Policy Wizard, for editing it in the same fashion that it
was created. See Creating a Network Policy on page 6-13 for more details.
Close Closes the Network Policy Manager without saving any changes.
Configuring Policies 6-39
3. When done, click Next. An Network Policy Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Network Policy and exit the wizard.
5. Click Close in the Network Policy Manager panel.
See the following sections for more details on working with Switch Policies and related components that
comprise a Switch Policy:
• Security Policies on page 6-39
• Access Control Lists on page 6-47
• WLANs on page 6-50
• Ethernet Port Policies on page 6-55
• Setting the Country on page 6-66
• Creating a Switch Policy on page 6-66
• Defining/Activating an Emergency Switch Policy on page 6-71
To see the configuration hierarchy while creating a Security Policy, click Where Am I? at any point. A Where
Am I? Dialog Box, such as Figure 6.59, is displayed.
Figure 6.59 Security Policy Where Am I? Dialog Box
5. Select one or more authentication/key management method to apply to the Security Policy, as described
in Table 6.6.
Table 6.6 Authentication/Key Management Method Settings
Setting Description
Manually Pre-Shared Key If you use Pre-shared Key (PSK) authentication, the same key is used for
authentication and encryption. The format and configuration of the key is set in
the Configure panel of the selected encryption method.
Kerberos Uses a Kerberos server for mobile unit authentication. You can specify an
external server or the switch's on-board server. To use the on-board server, you
must first configure the switch to be a Kerberos Master by visiting System
Settings > Kerberos > Configuration> KDC. Kerberos only supports KeyGuard and
WEP encryption. To configure the Kerberos settings used by this policy, click the
Configure button.
802.1x EAP Specifies 802.1x EAP authentication using an external Remote Authentication
Dial-In User Service (Radius) server. The Radius server must be accessible to the
switch. To configure the EAP settings used by this policy, click the Configure
button.
Broadcast Key Rotation EAP authentication provides dynamic unicast WEP keys for client devices but
uses static broadcast, or multicast, keys. When broadcast WEP key rotation is
enabled, the access point provides a dynamic broadcast WEP key and changes at
the specified interval. The default interval is 600 seconds.
6-42 WS5000 Series Switch System Reference Guide
6. When done, click Next. Depending on the Encryption and Authentication settings specified, the
subsequent panels change. These different panels, and how to configure their settings or controls
follow:
• Kerberos Authentication Settings on page 6-42
• WEP Encryption Settings on page 6-43
• EAP Authentication Settings on page 6-44
Figure 6.62 Kerberos Authentication Settings
The Kerberos Authentication Settings panel is where Kerberos KDC (Key Distribution Center) servers
and realm are specified for the Security Policy, as described in Table 6.7.
Table 6.7 Kerberos Authentication Settings
Setting Description
Primary/Backup/Remote KDC The three KDC text fields require fully-qualified domain names or IP addresses of
Address and Port the Primary KDC, and optionally, the Backup KDC, and Remote KDC servers. The
three servers should actually be thought of as "primary," "first backup," and
"second backup."
If the Primary KDC fails, the system looks for the Backup KDC. If the backup fails,
it looks for the (nominal) Remote KDC. Thus, for example, the Primary KDC can be
a remote server, the Backup KDC can be the on-board KDC of the Primary Switch
("Primary" in the failover mode sense), and the Remote KDC can be the Standby
Switch (again, in the failover sense).
If using the switch's on-board Kerberos server, specify the actual IP address of
NIC1 or NIC2, depending on which one you want to use.
Realm Name In addition to a Primary KDC server, a Kerberos Realm Name is required. The
Realm Name value should be all upper-case (since it is usually also the DNS
domain).
Saving the Settings To save settings, click the Save button. The button is disabled until a Primary
KDC server and a Realm Name value is entered.
The WEP Encryption Settings panel is where four pre-shared, manually fixed WEP keys are defined for
the Security Policy, as described in Table 6.8.
Table 6.8 WEP Encryption Setting Descriptions
Setting Description
Key Size To set the key size, choose the 40 bit Key or 128 bit Key radio button in the Key
Size box. If you're using KeyGuard, the key size is automatically set to 128 bits.
6-44 WS5000 Series Switch System Reference Guide
Key Values There are three ways to define your WEP key values:
• Generate a key from a plain text password (or "pass key"). Enter the pass key
in the Pass Key field, select the key you want to generate by clicking a radio
button next to one of the Key #N fields, and then click the Generate button.
A valid pass key value is 1 to 20 ASCII characters in length.
• Define the keys by typing ASCII values into each of the Key #N slots. For a 40-
bit keys use 5-character ASCII values; for 128-bit keys use 10-character
values.
• Type hexadecimal values into the Key #N slots. Use 12 hex characters for 40-
bit keys and 26 hex characters for 128-bit keys.
Reset Keys This button resets the four keys to their factory-default values.
Key Use To indicate the key to be used, click the radio button to the left of its Key
#N slot.
The EAP (Radius) Authentication Settings panel lets you identify the Radius server and set the switch-
side parameters used during Radius authentication. Radius server can of two types
• Remote radius server
• On-board radius server
Figure 6.64 EAP Authentication Settings
If the radius server is remote then it cannot be completely configured through the tools provided by the
wireless switch. This association remains unused unless the Radius server also adds the switch as a
client.
If an On- board radius server is used then the switch should be added as a client. The IP address and
shared secret should be set as configurable.Refer Configuring Clients for more details.
Configuring Policies 6-45
Table 6.9 describes the EAP authentication settings and Radius identification settings to be configured.
Table 6.9 EAP Authentication Settings and Radius Identification Settings
Setting Description
Authentication Settings
Opportunistic PMK Caching When enabled, Pairwise Master Key (PMK) Caching tells the access ports to
cache the mobile unit's credentials as they (the MUs) are authenticated. If the
MU roams away from that AP and then back again, the MU doesn't have to re-
authenticate.
Reauthentication Period Specifies the time interval, in seconds, after which mobile units are forced to
reauthenticate with the Radius server. Valid values are in the range [30, 65535]
seconds; the default is 3600 seconds (1 hour). To edit the Reauthentication value,
click the corresponding checkbox.
Max Retries Specifies the number of times a mobile unit can try to authenticate during the
reauthentication phase. Valid values are in the range [1, 99]; the default is 5
attempts. A value of 1 means if the first reauthentication attempt fails, the
mobile unit will not be allowed to (re)associate with the switch.
Radius Server Name/IP Specify the IP addresses or fully-qualified domain names of the servers. Radius
Port
Radius Port Radius UDP authentication port. This is the port number, in the range [1, 65535,
that the wireless switch uses to send requests to the Radius server. The default
is 1812.
Radius Shared Secret Specify the key used to encrypt communication between the wireless switch and
the Radius server(s). The secret that you supply here must match the secret that
was specified when the wireless switch was added as a client of the Radius
server. You have to add the switch to the Radius server using tools that are
provided by the Radius server itself. In other words, the switch can't “push” itself
onto the server, the server must “pull” the switch into its client corral.
Advanced Settings
(In general, default settings are acceptable. Only experienced Radius users should modify these values.)
Quiet Period Specifies how long the switch waits, in seconds, between (failed) attempts to
authenticate an MU.
Supplicant Timeout Specifies how long the switch waits, in seconds, for an authenticated-but-
recently-dissociated MU to respond to a re-associate request. When the
supplicant timeout expires, the MU will need to re-authenticate before re-
associating.
Tx Period Specifies how long the switch waits, in seconds, for an MU to respond to a
"request identity" message. After the Tx period expires, the switch sends another
"request identity" to the MU. When the MU responds to the message, the
authentication process begins.
6-46 WS5000 Series Switch System Reference Guide
Table 6.9 EAP Authentication Settings and Radius Identification Settings (Continued)
Setting Description
Max Retries If the reauthentication period is enabled, this value specifies the number of times
the switch will try to re-authenticate an MU that doesn't respond to the “request
identity” message.
Save To save your settings, click the Save button. The button is disabled until you
provide Radius Server Name/IP, Radius Port, and Radius Shared Secret values.
7. When done, click Next. An Security Policy Created Successfully! message panel is displayed.
8. Click Finish to save the new Security Policy and exit the wizard.
Configuring Policies 6-47
See the following sections for more details on working with switch ACL:
• Creating an Access Control List on page 6-48
• Modifying an Access Control List on page 6-49
6-48 WS5000 Series Switch System Reference Guide
2. Enter a name and default action (allow or deny) for the new ACL, then if desired, select Use an existing
Access Control List as a template.
3. Click Next. A panel for configuring the ACL rules is displayed. An ACL rule consists of a MAC address
range, and an action (either allow or deny). When an MU is discovered, its MAC address is compared to
the defined ACL rules, as follows:
• If the MU is in an “allow” rule, the MU is allowed to associate.
• If the MU is in a “deny” rule, it's not allowed to associate.
• If the MU is in neither rule, the default action applies.
Configuring Policies 6-49
Configure the ACL rules per the control options described in Table 6.10.
Table 6.10 Creating an ACL—Control Options within Rule Configuration Panel
Control Description
Add... To add a new rule, click the Add... button. In the panel that appears, fill in the
start MAC, end MAC, and action (type).
Delete and Edit... The Delete and Edit... buttons work on the currently selected rule to remove or
edit a rule, respectively.
Upload... ACL rules can be defined in a text file, and then uploaded to the switch using the
the Upload button.
The ACL file format contains one rule per line. The rule must follow this format:
action StartMac EndMac
Search... To look for a specific MAC address among the rules defined, click Search... and
enter the address in the panel that appears (and click Find in the new panel). If
the MAC is affected by a rule, that rule is selected in the rule list.
4. When done, click Next. An Access Control List Rule Created Successfully! message panel is
displayed.
5. Click Finish to save the new Access Port Policy and exit the wizard.
2. This panel lists all available Access Control Lists configured on the system. See Table 6.10 for more
details on the controls within this panel to modify the ACL.
3. When done, click Next. An Access Control List Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Access Control List and exit the wizard.
5. Click Close in the Access Control List Manager panel.
6.2.3 WLANs
A WLAN defines attributes applied to mobile units on a portion of the wireless LAN. To see the configuration
hierarchy while creating a WLAN, click Where Am I? at any point. A Where Am I? Dialog Box, such as Figure
6.69, is displayed.
Figure 6.69 WLAN Where Am I? Dialog Box
See the following sections for more details on working with Ethernet Port Policies:
• Creating a WLAN on page 6-51
• Modifying a WLAN on page 6-53
Configuring Policies 6-51
2. Enter a name and description for the new WLAN, then if desired, select Use an existing WLAN as a
template.
3. Click Next. A panel for configuring ESS ID, MU associations, and WLAN network addresses is
displayed.
4. Configure the ESS ID, mobile unit association and WLAN network address controls, as displayed in
Figure 6.71 and described in Table 6.11, for the WLAN being created. (If a template was selected in step
2, some components may already be defined.)
Figure 6.71 Creating a WLAN—Configuring ESS ID, MU Association and WLAN Network Address Controls
6-52 WS5000 Series Switch System Reference Guide
Table 6.11 Creating a WLAN—Configuring ESS ID, MU Associations, and WLAN Network Address Controls
Configuration Components Description
ESS ID Controls
ESSID Use this text field (1 to 32 characters) to assign an Extended Service Set Identifier
(ESSID) to the WLAN.
Accept Any ESSID When unchecked, an MU trying to associate with the access port on the WLAN
checkbox must have the same ESS ID.
When checked, the Access Port will allow any MU to associate. (However, an
ESSID value still must be supplied).
Secured Beacon checkbox When Use Secured Beacon is checked (in the lower right corner) is checked,
the WLAN's ESSID is not broadcast in the AP's beacon message, otherwise
(unchecked) it is.
MU Access Controls
Max MUs field Maximum number of MUs that can associate through this WLAN at a time, in the
range [1, 4095].
MU to MU Disallow When checked, MUs are disabled from being able to communicate directly with
checkbox each other. Instead, all MU to MU packets are routed through the network.
MU to MU Drop checkbox When checked, packets sent from one MU to another are dropped within the
switch.
ACL field To apply an Access Control List to the WLAN's gateway, choose an ACL from the
Create... button drop-down list. To create a new ACL, click Create... See Creating an Access
Control List on page 6-48 for more details.
Network Addresses
Default Route Set the IP address (default route) and subnet mask (netmask) of the WLAN's
Netmask gateway.
5. When done, click Next. A new wizard panel is displayed, as shown in Figure 6.72, to apply a security
policy.
6. Select a security policy or click the Create button to create a new security policy (see Creating a
Security Policy on page 6-40 for more details). If the selected security policy includes Kerberos
Authentication, a Kerberos Password field is enabled, and must also be entered.
Configuring Policies 6-53
7. When done, click Next. A WLAN Created Successfully! message panel is displayed.
8. Click Finish to save the new WLAN and exit the wizard.
2. This panel lists all available WLANs configured on the system, as well as their settings. Table 6.12
describes the fields and options within this panel.
Table 6.12 WLAN Manager Fields and Controls
Field or Control Description
Max MUs Maximum number of Mobile Units allowed on the selected WLAN.
ACL Rule Active Access Control List policy for the selected WLAN.
Secured Beacon Controls the behavior of the Access Port signal for this WLAN. One of two values:
• Enable stops broadcasting the beacon.
• Disable allows broadcasting.
Accept Any ESSID Whether ESSIDs are accepted or not. One of two values:
• If true, the ESSID field is ignored in mobile unit configurations and all mobile users are
allowed to connect to the switch.
• If false, a limited number of mobile user connections to mobile users are configured
with the switch’s ESSID.
Create Launches the WLAN Wizard to create a new WLAN. See Creating a WLAN on page 6-51
for more details.
Delete Removes the selected WLAN from the system. A dialog appears to confirm this action.
Edit Opens a variation of the WLAN Wizard, for editing it in the same fashion that it was
created. See Creating a WLAN on page 6-51 for more details.
3. When done, click Next. An WLAN Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Ethernet Policy and exit the wizard.
5. Click Close in the WLAN Manager panel.
Configuring Policies 6-55
To see the configuration hierarchy while creating an Ethernet Port Policy, click Where Am I? at any point. A
Where Am I? Dialog Box, such as Figure 6.74, is displayed.
Figure 6.74 Ethernet Port Policy Where Am I? Dialog Box
See the following sections for more details on working with Ethernet Port Policies:
• Creating an Ethernet Port Policy on page 6-55
• Modifying an Ethernet Port Policy on page 6-58
• Configuring VLANs on page 6-59
Figure 6.75 Creating an Ethernet Port Policy—Naming the Policy (and Optionally, Choosing a Template)
2. Enter a name and description for the new Ethernet Port Policy, then if desired, select Use an existing
Ethernet Policy as a template.
3. Click Next. A panel for specifying VLAN support is displayed (Figure 6.76).
VLANs are virtual LANs that can support the wireless side of the network. The VLANs for the two
Ethernet ports are specified in separate tabs (ethernet1 tab, ethernet2 tab); otherwise, the contents of
the two tabs are the same. Specify a VLAN, based on the following available options:
• To force a discovery of any existing VLANs, click VLAN Discovery... If any appear, they can then
be selected from the discovery list and added to the Ethernet Port Policy.
• To manually add a new VLAN to the Ethernet policy, click Add and fill in the VLAN ID, Priority, and
Subnet fields.
The Priority setting is relative to other priorities. The greater the priority value, the greater service
that VLAN gets. If this is the Primary VLAN for the port, click the Primary radio button.
4. When done specifying a VLAN(s), click Next. A panel for associating WLANs to its NICs (or VLANs) is
displayed (for trunk ports only).
Figure 6.77 Creating an Ethernet Port Policy—Associating WLAN toNICs (or VLANs)
Select a VLAN row in the mapping table and select the WLAN you want to map it to. Other options
include:
• To add a new arbitrary mapping click Insert, select the NIC that the VLAN will be on, specify the
VLAN ID or IP address, and select the WLAN.
• If you need to create a new WLAN, click the Create WLAN... button. See Creating a WLAN on page
6-51 for more details.
• To remove a mapping, select the VLAN row and click the Remove button.
5. When done, click Next. An Ethernet Policy Created Successfully! message panel is displayed.
6. Click Finish to save the new Ethernet Policy and exit the wizard.
6-58 WS5000 Series Switch System Reference Guide
2. This panel lists all available Ethernet policies configured on the system. Table 6.13 describes the fields
and options within this panel. To edit a policy, select the policy name in the left pane.
Table 6.13 Ethernet Policy Manager Fields and Controls
Field or Control Description
Properties Displays the the LANs or VLANs associated with the selected Ethernet policy.
Create Launches the Ethernet Policy Wizard to create a new Ethernet Policy. See Creating an Ethernet Port
Policy on page 6-55 for more details.
Delete Removes the selected policy from the system. A dialog appears to confirm this action.
Edit Opens a variation of the Ethernet Policy Wizard, for editing it in the same fashion that it was
created. See Creating an Ethernet Port Policy on page 6-55 for more details.
Close Closes the Ethernet Policy Manager without saving any changes.
3. When done, click Next. An Ethernet Policy Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Ethernet Policy and exit the wizard.
5. Click Close in the Ethernet Policy Manager panel.
Configuring Policies 6-59
Note The recommended Ethernet port configuration in the wireless switch has
Ethernet ports (1) and (2) on different subnets with Ethernet port (1) supporting the
WLAN infrastructure (access ports and associated MUs). Always map the primary
VLAN ID to Ethernet port (2) in this configuration.
See the following for more details on working with Access Port Policies:
• Creating an Access Port Policy on page 6-59
• Modifying an Access Port Policy on page 6-64
Figure 6.80 Creating an Access Port Policy—Naming the Policy (and Optionally, Choosing a Template)
2. Enter a name and description for the new Access port policy, then if desired, select Use an existing
Access Port Policy as a template.
3. Click Next. A panel for applying a WLAN(s) to the Access Port Policy is displayed.
Figure 6.81 Creating an Access Port Policy—Assigning an Available WLAN(s)
4. Select from among the Available WLANs and click the >> button to move a WLAN(s) (from 1 to 16
WLANs) to the Selected pane, and apply it to the Access Port Policy.
To create a new WLAN, click Create. See Creating a WLAN on page 6-51 for more details.
5. Click Next. A panel for specifying WLAN policy definitions for specific AP hardware types is displayed
(for example, Figure 6.82). Depending on the selected tab, the contents of this panel change slightly.
Configuring Policies 6-61
Figure 6.82 Creating an Access Port Policy—Specifying Policy Definition for Specific AP Hardware Types
There are seven AP hardware types: AP 100, AP 200a, AP 200b, AP 300a, AP 300g, and converted access
points AP 302x (frequency-hopping) and AP 4131. These hardware types are grouped by the number and
mapping of BSSIDs and ESSIDs. Therefore, each such group is presented in separate tabs. On each tab,
a WLAN(s) can be selected that will support that hardware group. Table 6.14 describes the WLAN
parameters that can be specified, per hardware type.
Table 6.14 WLAN Parameters, Per Hardware Type, within Access Port Policy Definition
Parameter Description
WLAN Name Select as many as four WLANs that will support AP 100 Access Ports. These APs
provide a 1-1 mapping of four BSSIDs to four ESSIDs. The BSSID values are
created automatically. The WLANs will also be included in the beacon.
WLAN Name All WLANs are automatically added to the AP 200a group, and are given a single,
State auto-generated BSSID that maps to 16 ESSIDs. Use the State flag to declare
which of the listed WLANs should be considered the "Primary," WLAN.
Table 6.14 WLAN Parameters, Per Hardware Type, within Access Port Policy Definition (Continued)
Parameter Description
WLAN Name This group provides a single BSS/ESS mapping, by default, for Frequency
Hopping 302x (converted) Access Points. Use the radio buttons to select the
WLAN that will support these devices.
6. When done configuring the hardware type, click Next. A panel for assigning a network policy is
displayed. For each WLAN listed in the left column, select a Network Policy to be applied for the WLAN.
Figure 6.83 Creating an Access Port Policy—Assigning a Network Policy for Each WLAN in the Access Pol-
icy
To create a new Network Policy, click Create... See Creating a Network Policy on page 6-13 for more
details.
7. When done, click Next. A panel for assigning RF bandwidth settings is displayed. Bandwidth is set, per
hardware type, so four tabs are shown.
Configuring Policies 6-63
Figure 6.84 Creating an Access Port Policy—Assigning a Network Policy for WLANs in the Access Policy
A WLANs bandwidth is the guaranteed minimum amount of available network bandwidth reserved to
be used by a specific WLAN.
Edit the bandwidth field, in each hardware type tab, to divide the network RF bandwidth across all
WLANs assigned per hardware type grouping. The total bandwidth in each tab must be equal to 100%.
8. When done, click Next. A panel to specify radio characteristics for the Access Port Policy is displayed.
Figure 6.85 Creating an Access Port Policy—Specifying Radio Characteristics
6-64 WS5000 Series Switch System Reference Guide
Configure the Access Port Policy radio settings per the descriptions in Table 6.15. Radio settings should
be configured for all supported radio types in the four different tabs.
Table 6.15 Access Port Policy Radio Settings
Setting Description
DTIM Interval Sets the Delivery Traffic Indication Method (DTIM) Interval as a multiple of the
beacon interval. Valid settings are in the range [1, 20]. Broadcasts are stored by
the Access Port. When the Access Port receives a polling signal at the DTIM
interval, it releases the broadcast message to the MU.
Beacon Interval Sets the AP's beacon interval, in milliseconds. Valid intervals are in the range
[20 – 1000].
RTS Threshold Sets the Request to Send (RTS) threshold. This is the maximum size of packets
that use the 4-way handshake. The threshold is set by default to 2347 (the largest
packet size), and turns off the 4-way handshake. The 4-way handshake allows
nearby Access Ports to sense the wireless conversation and improve throughput.
Preamble Use the radio buttons to set the type of network message preamble (short or long)
that is added to messages that are sent through this Access Port Policy.
802.11x Tabs Declare the data rates supported as one of the following:
• Basic
• Supported
• Not Used
9. When done, click Next. An Access Port Policy Created Successfully! message panel is displayed.
10. Click Finish to save the new Access Port Policy and exit the wizard.
Figure 6.86 Modifying an Existing Access Port Policy—Access Port Policy Manager
2. This panel lists all available Access Port Policies configured on the system. Table 6.16 describes the
fields and options within this panel. To edit a policy, select the policy name in the left pane first.
Table 6.16 Access Port Policy Manager Fields and Controls
Field or Control Description
Properties Displays a list of access ports (when highlighted in the tree) that can be adopted by the
policy. The list itself is defined by the Wireless Switch Policy.
See Switch Policies on page 6-39 for more details.
Create Launches the Access Port Policy Wizard to create a new Access Port Policy. See Creating
an Access Port Policy on page 6-59 for more details.
Delete Removes the selected policy from the system. A dialog appears to confirm this action.
Edit Opens a variation of the Access Port Policy Wizard, for editing it in the same fashion it
was created. See Creating an Access Port Policy on page 6-59 for more details.
Close Closes the Access Port Policy Manager without saving any changes.
3. When done, click Next. An Access Port Policy Updated Successfully! message panel is displayed.
4. Click Finish to save the updated Access Port Policy and exit the wizard.
5. Click Close in the Access Port Policy Manager panel.
6-66 WS5000 Series Switch System Reference Guide
Note As long as the Country selection remains set to None, the wireless switch
cannot adopt any access port(s).
To set the country, modify the “Default Wireless Switch Policy”, or create a new Wireless Switch Policy with
the appropriate country for the wireless location. See Creating a Switch Policy on page 6-66 for more details.
2. Enter a name and description for the new Wireless Switch Policy, then if desired, select Use an
existing Wireless Switch Policy as a template.
3. Click Next. A panel for configuring the settings of the Wireless Switch Policy is displayed.
Configuring Policies 6-67
Configure the Wireless Switch Policy settings per the descriptions in Table 6.17.
Table 6.17 Wireless Switch Policy Settings
Setting Description
Switch Settings
Country Select the appropriate country for the location of the wireless switch. The switch
will not adopt Access Ports until the country is set. Once a country is specified,
the None option is no longer available.
Emergency Check this box to designate the Wireless Switch Policy as the "Emergency"
Switch Policy (ESP). There can only be one ESP at a time (A Switch Policy that
previously assigned as the ESP will no longer act as such.)
After designating an Emergency Switch Policy, the ‘E’ icon in the lower left corner
of main window will turn red. You can turn the ESP on and off by clicking the icon.
When you turn the ESP off, the previously active Switch Policy will be re-
activated.
Ethernet Port Policy Each Switch Policy incorporates a (single) Ethernet Port Policy. To make this
assignment, you can select from among the existing Ethernet Port Policies, or you
can click Create... To create a new policy, see Creating an Ethernet Port Policy
on page 6-55.
6-68 WS5000 Series Switch System Reference Guide
Channel Select a value from the Channel.11x field. The set of discreet channels available
depends on the country of operation, and is further limited by the restricted
channels declared in the Automatic Channel Settings panel.Special values
include:
• Auto (once) – The AP uses Automatic Channel Selection (ACS) the first time
that it is adopted by the switch, and then sticks to the channel thereafter.
• Auto – The AP uses ACS every time that it is adopted.
• Random – The AP chooses a random channel every time it's adopted.
Power Select a mW value from the Power.11a field. The set of values depends on the
country.
Allow DS Coexistence. Only on the 802.11 FH tab. By checking this box, the Access Port divides the
frequency spectrum so Frequency-Hopping (FH) devices use one portion, and
Direct-Sequence (DS) devices use the other.
ACS Settings Click this button to add/modify Restricted Channel Settings, which defines a set
of channels the Automatic Channel Selection (ACS) mechanism is not allowed to
choose.
Separate sets of restricted channels can be specified for 802.11a and 802.11b/g
devices. To add a restricted channel, click Add and choose a channel. If desired,
add descriptive text to explain why the channel is restricted.
To remove a channel from the list, select a channel in the list and click Delete.
4. When done, click Next. A panel to associate Access Port Policies to the Wireless Switch Policy is
displayed.
Configuring Policies 6-69
5. Select from among the Available Access Port Policies and click the >> button to move a Policy(s) to the
Selected pane, and to apply it to the Wireless Switch Policy.
6. When done, click Next. A panel to create a set(s) of access ports (and converted access points) the
switch is allowed to adopt is displayed.
Figure 6.90 Creating a Wireless Switch Policy—Allowed Adoption Lists
7. If desired, create an Access Port List that includes “allowed” MAC address ranges. Only those APs that
fall thin the specified address range(s) are allowed to be adopted.
If you do not specify an disallowed AP list, all APs are candidates for adoption.
8. When done, click Next. A panel to create a set(s) of access ports (and converted access points) that the
switch disallows to be adopted is displayed.
6-70 WS5000 Series Switch System Reference Guide
9. If desired, create an Access Port List that includes “disallowed” MAC address ranges. Only those APs
that fall within the specified address range(s) are disallowed to be adopted.
If you do not specify an allowed AP list, all APs are candidates for adoption.
10. When done, click Next. A panel to assign an action to be taken when the Wireless Switch detects an
“unknown” AP—or, in other words, an AP that is not in an “allowed” list or “disallowed” list—is
displayed.
Figure 6.92 Creating a Wireless Switch Policy—Assigning an Action for Unknown APs
Rogue Access Ports (APs) are an area of concern with respect to LAN security. The term Rogue AP denotes an
unauthorized access port connected to the production network or operating in a stand-alone mode (perhaps in
a parking lot or in a neighbor’s building). Rogue APs are not under the management of network administrators
and do not conform to any network security policies.
Although 802.1x security settings should completely protect the LAN, organizations are not always fully
compliant with the newest wireless-security best practices. In addition, organizations want the ability to
detect and disarm rogue APs. The WS5000 Wireless Switch provides a mechanism for detecting and reporting
rogue APs.
From the Rogue AP Detection field, select Enable to allow the switch to scan for rogue AP’s over the
network. If you set Rogue AP Detection to Disable, all UI components in this screen are disabled. Disabling
Rogue AP Detection leaves the switch vulnerable to data theft from rogue devices on the switch managed
network.
2. Check the RF Scan by AP box if you want the switch to work with the APs to detect a rogue AP. By
default, this method is selected.
The switch sends a WISP configuration message to each adopted AP indicating rogue AP detection is
required. Each AP listens for beacons on its present channel and passes the beacons to the switch
without modification. The switch then processes the beacons to determine whether any of them are
rogues. This method is less disruptive than the RF Scan by MU mode.
3. Check the RF Scan by Detector AP box if you want the switch to work with the detector AP on the
LAN (which you set up) to detect rogue APs.
Note Only some devices have the capability of being a Detector AP, including
Symbol AP100, AP200, and AP300 Access Ports.
4. Enter a time interval (in minutes) in the Scan Interval field for each enabled detection method. By
default, the scans are set at one hour intervals.
The Detector AP screen displays the available AP list on the left and the detector AP list on the right.
7-4 WS5000 Series Switch System Reference Guide
To set an AP as a detector AP, click the AP from the available AP list and click the >> button to move it to the
detector AP list.
To move it back to the available AP list, click the << button. Click Apply.
1. Check the Authorize Any AP Having a Symbol Defined MAC Address box to indicate any Symbol
AP (which has a known Symbol MAC address) is an approved AP. This is helpful for rendering all Symbol
devices as approved without having to filter through the list of located addresses.
2. Define the following Rule Management options:
MAC Address Enter a valid mac address used during the detection process or use a wild card
(FF:FF:FF:FF:FF:FF) to represent any MAC address.
ESSID Enter an approved ESSID used during the detection process or use a wild card(*)
to represent ANY ESSID.
3. Select a rule and click the Del button to delete it from the table.
4. Click the Delete All button to clear the entire rule list.
Configuring Rogue AP Detection 7-5
5. Click Apply from the Rogue AP screen to save your changes to the Rule List and Rogue AP screens.
6. Click Cancel from the Rogue AP screen to cancel all updates to the Rogue AP and Rule List screens.
Each row of the AP List represents all unapproved and approved APs that the switch has located. The MAC
and the ESSID for each AP are listed. Use this portion of the screen to change the age out time or to add a rule
to the rule list for a particular AP:
1. Enter a value in the Approved AP 's Entry Age Out Timer field to indicate the number of elapsed
minutes before an AP will be removed from the approved list and reevaluated. A zero (0) for this value
indicates an AP can remain on the list permanently.
2. Click the Add to Rule List button to add a rule to the Approved APs' Rule Management table on the
Rogue AP Detection screen. The generated rule uses the MAC address and ESSID of the selected AP.
The Rogue AP List
Each row of the Rogue AP List represents a rogue AP the switch has found. It lists the MAC address and the
ESSID for each rogue AP.
1. Enter a Rogue Entries Age out time to indicate the number of elapsed minutes before an AP is
removed from the rogue list and reevaluated. Entering a zero indicates an AP can stay on the list
permanently.
2. Click the Add AP to Rule List button to add the AP to the Approved APs' Rule Management table of
the Rogue AP Detection screen. The generated rule uses the MAC address and ESSID of the selected AP.
The top of the Rogue AP Details screen lists information about the AP.
Last Heard At Indicates the number of elapsed hours since the rogue AP was last noticed on
the network in hours:minutes:seconds.
Discovering AP Displays the MAC address of the AP that detected the rogue APs.
MAC
Signal Strength Displays the Receiver Signal Strength Indicator (RSSI) for the rogue. This value
is between 1 and 255. The larger the value, the better the signal strength and
the closer the AP.
Note The WS5000 Wireless Switch only reports rogue APs, it does not remove
them from the network. It is up to the administrator to change security settings or
disrupt the rogue AP's connection
For more information on configuring the WS5000 Series Switch to support the Syslog events described in this
section, see Syslog Context on page 8-189.
CLI Command Reference
This chapter describes the commands that are defined by the WS5000 Series Command Line Interface (CLI).
Access the CLI by running a terminal emulation program on a computer that is connected to the serial port at
the front of the switch, or by using Telnet via secure shell (SSH) to access the switch over the network.
The default cli user is “cli”. The default username and password is admin and symbol, respectively.
banner
Events Syslog
FTP
Firewall (FW)
Host [Host_Name]
Radius
Rogue AP
CLI Command Reference 8-3
Route
Sensor [Sensor_MAC]
SNMP
Secure Shell
Standby
Telnet
Tunnel [GRE_Tunnel_Name]
User [User_Name]
WLAN [WLAN_Name]
WME [WME_Name]
WVPN
Most of the switch configuration is performed in subcontexts of the Configuration context. For example, to drop
into the WLAN subcontext you type “wlan” from the Configuration context:
WS5000.(Cfg)> wlan
WS5000.(Cfg).wlan>
To bump up a context level, type “..”:
WS5000.(Cfg).wlan> ..
ws5000.(Cfg)>
To jump to the system context use exit:
WS5000.(Cfg).wlan> exit
ws5000>
Note You can’t go “up and over” when navigating the CLI—constructions such as
“.. context” or “../context” do not work.
The following example shows you how to use the index number 1 to access the Default Access Port Policy
subcontext.
WS5000.(Cfg).APPolicy>
WS5000.(Cfg).APPolicy> show
WS5000.(Cfg).APPolicy> 1
Access Port Policy details for "Default Access Port Policy":
WLAN details for the Access Port policy 'Default Access Port Policy'
WLAN Name Network Policy
--------- --------------
Symbol Default Default Network Policy
WS5000.(Cfg).SPolicy.[TestPolicy]>
8-6 WS 5000 Series System Reference
When you create an instance, the command prompt changes to that instance’s context; the name of the
instance context is shown in brackets. Like contexts, the available commands are based on the type of instance
created, and are used to configure the instance specifically.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.2.1 .. or end
Common to all contexts and instances, except System Context
Terminates the context or instance session, and changes the command prompt to be one higher.
Syntax
..
or
end
or
exit
Parameters
None.
Example
WS5000.(Cfg).NP> ..
WS5000.(Cfg)> end
WS5000>
8.2.2 exit
Common to all contexts and instances, except System Context
Terminates the context session, and returns the prompt to the root (for example, WS5000>).
For example, if you use the exit command in the ACL context, the prompt reverts to the System context prompt.
Syntax
exit
Parameters
None.
Example
WS5000.(Cfg).ACL> exit
WS5000>
8.2.3 ? or help
Common to all contexts and instances
Retrieves a list of commands supported given the context or instance.
Syntax
?
or
help
Parameters
None.
Example
WS5000> ?
8-8 WS 5000 Series System Reference
or
WS5000> help
8.2.5 clear
Common to all contexts and instances
Clear the screen.
Syntax
clear
Parameters
None.
Example
WS5000> clear
8.2.6 emergencymode
Common to all contexts and instances
Enables or disables the “Emergency” Switch Policy (ESP), a switch policy that can activated (enabled) at any
time in case of an emergency. When ESP is deactivated (disabled), the previous switch policy is reactivated.
To set the emergency policy, use the emergencymode command.
Syntax
> emergencyMode <enable_flag>
CLI Command Reference 8-9
Parameters
enable_flag Indicates whether to enable or disable the ESP. Possible values are:
• enable
• disable
Example
WS5000.<context_path> > emergencymode enable
8.2.7 history
Common to all contexts and instances
Display the history of commands invoked at the command prompt for any given context. Alternatively, using
the keyboard “up arrow” key is a short-cut to retrieve (and reuse) commands that were used previously in a
context session.
Syntax
history
Parameters
None.
Example
WS5000.<context_path> > history
8.2.8 ping
System Context, Configuration (Cfg) Context, Host Context
Sends ICMP ECHO_REQUEST packets to a network host.
Syntax
ping [-Rdfnqrv] [-c count] [-i wait] [-l preload] [-p pattern]
[-s packetsize] <host/IP_address>
8-10 WS 5000 Series System Reference
Parameters
-c count Stop after sending count ECHO_REQUEST packets. With deadline option, ping waits for
count ECHO_REPLY packets, until the timeout expires.
-i wait Wait interval of seconds between sending each packet. The default is to wait for one
second between each packet normally, or not to wait in flood mode. Only super-user may
set interval to values less 0.2 seconds.
-l preload If preload is specified, ping sends that many packets not waiting for reply. Only the
super-user may select preload more than 3.
-p pattern You may specify up to 16 “pad” bytes to fill out the packet you send. This is useful for
diagnosing data-dependent problems in a network. For example,
-p ff will cause the sent packet to be filled with all ones.
-s packetsize Specifies the number of data bytes to be sent. The default is 56, which translates into
64 ICMP data bytes when combined with the 8 bytes of ICMP header data.
host/IP_address The name or IP address of the host to which the request packets are sent.
Example
WS5000> ping WS5000
PING WS5000 (10.1.1.101): 56 data bytes
64 bytes from 10.1.1.101: icmp_seq=0 ttl=255 time=0.037 ms
64 bytes from 10.1.1.101: icmp_seq=1 ttl=255 time=0.042 ms
64 bytes from 10.1.1.101: icmp_seq=2 ttl=255 time=0.05 ms
64 bytes from 10.1.1.101: icmp_seq=3 ttl=255 time=0.052 ms
configure Change to the Configuration Context to configure system attributes page 8-12
copy Copy files between the Switch and TFTP/FTP server page 8-13
directory Display the available image/config files in the system page 8-15
export Export log files from the switch to the TFTP server page 8-16
8.3.1 ? or help
System Context
Retrieves a list of commands supported given the context or instance.
Syntax
?
or
help
8-12 WS 5000 Series System Reference
Parameters
None.
Example
WS5000> ?
or
WS5000> help
8.3.3 clear
System Context
Clear the screen.
Syntax
clear
Parameters
None.
Example
WS5000 > clear
8.3.4 configure
System Context
Puts the user in the Configuration (Cfg) Context to configure system attributes. See Configuration (Cfg) Context
on page 8-45 for more details.
Syntax
configure
CLI Command Reference 8-13
Parameters
None.
Example
WS5000 > configure
WS5000.(Cfg)>
8.3.5 copy
System Context
Copies a file from the WS5000 to a (T)FTP server, or vice versa. TFTP can be used to transfer *.sys.img,
*.cfg, and *.sym files. FTP can be used to transfer .krb, .sys.img, .cfg, and .sym files.
The default protocol is TFTP.
The default user for FTP: anonymous
The default mode for FTP: binary
If using FTP, and the user is not anonymous (using -u option), CLI prompts the user to enter password.
IMPORTANT! DO NOT USE THIS COMMAND FOR FILES LARGER THAN 32MB.
!
Syntax
copy <source> <destination> [-u user] [-m mode]
For TFTP:
copy <source> <destination>
For FTP:
copy <source> <destination> [ -u <ftp_user> ] [ -m <ftp_mode> ]
Parameters
Example
WS5000.(Cfg)> copy tftp system
Enter the file name to be copied from TFTP server : backup.sys.img
IP address of the TFTP server : 10.1.1.1
Copying 'backup.sys.img' from tftp://10.1.1.1 to Switch...
or
WS5000.(Cfg)> copy ftp://100.10.10.1/ftpimages/DefaultConfig.cfg system
Copying 'DefaultConfig.cfg' from ftp://100.10.10.1/ftpimages/ to Switch...
8.3.6 delete
System Context
Deletes the specified image or config file from the WS5000. Use the directory command to list the files that
can be deleted.
Syntax
delete <filename>
Parameters
Example
WS5000> directory
Date & Time Bytes File Name
8.3.7 description
System Context
Sets a description about the switch displayed with system information.
Syntax
description <description_text>
Parameters
Example
WS5000> description “Fifth Floor Switch”
8.3.8 directory
System Context
Lists the image and configuration files that are stored on the WS5000.
Syntax
directory
Parameters
None.
Example
WS5000> directory
Date & Time Bytes File Name
8.3.9 emergencymode
System Context
Enables or disables the “Emergency” Switch Policy (ESP), a switch policy that can activated (enabled) at any
time in case of an emergency. When ESP is deactivated (disabled), the previous switch policy is reactivated.
To set the emergency policy, use the emergencymode command.
Syntax
emergencyMode <enable_flag>
8-16 WS 5000 Series System Reference
Parameters
enable_flag Indicates whether to enable or disable the ESP. Possible values are:
• enable
• disable
Example
WS5000.<context_path> > emergencymode enable
8.3.10 export
System Context
Copy the log files from switch to remote TFTP server. Use logdir to view the list of user log files that can be
exported.
Syntax
WS5000 > export
Parameter
This command is interactive and asks for
Example
WS5000> export
Creating the Event list...
Enter the log file name :
8.3.11 history
System Context
Displays the history of the last 300 commands used.
Syntax
WS5000 > history
Parameters
None
Example
Command history...
1. copy ftp://157.235.188.237/home/pavank/dom/dominfo -u pavank -m bin
2. copy ftp://157.235.188.237/home/pavank/dom/dominfo system -u pavank -m bin
3. WS5000> copy ftp://157.235.188.237/home/pavank/dom/dominfo system -u pavank -m
bin
4. Enter the user password : ***********
5. Copying 'dominfo' from ftp://157.235.188.237 to Switch...
6. Data connection mode : BINARY (Connecting as 'pavank')
CLI Command Reference 8-17
8.3.12 install
System Context
Configures the switch’s failover role as Primary or Standby, and applies all settings specified in the command
file (.sym). Alternatively, this command is used to update Kerberos principals from a specified Kerberos file
(.krb), without reset.
Syntax
install <install_option> [filename]
Parameters
filename Command (*.sym) or Kerberos (*.krb) file to use, which contains configuration settings.
The default .sym file is command.sym
Example
WS5000.(Cfg)> install primary cmd_template.sym
Begin command file processing...
Begin parsing command file for download and logging parameters...
Command file was parsed successfully.
Current Image Version is 2.1.0. FS patch will not be installed.
Begin processing image file...
Nothing to do. Skipping...
Begin processing config file...
Nothing to do. Skipping...
Validating IP parameters...
ERROR: Hostname or IP has not been provided!
Cannot set switch to Primary.
ERROR: IP parameter validation failed.
8.3.13 logdir
System Context
Lists all the user saved log files (history, syslog). For example capturing Packets on ethernet 1 and saving that
captured file can be listed by command logdir.It does not list image or config files.Use directory command to
list image/config files.
Syntax
WS5000 > logdir
or
WS5000 > logdir user <username>
Parameter
Example
WS5000.(Cfg)> ..
WS5000> service
Enter CLI Service Mode password: ********
Enabling CLI Service Mode commands...... done.
SM-WS5000> cfg
SM-WS5000.(Cfg)> logdir
8.3.14 name
System Context
Use the name command to change the system name.
Syntax
name <system_name>
Parameters
Example
WS5000> name MiamiWS5000
Configuring name...
Status : Success.
MiamiWS5000>
8.3.15 ping
System Context
Sends ICMP ECHO_REQUEST packets to a network host.
Syntax
ping <host/ip_address>
OPTIONS:
ping [-Rdfnqrv] [-c count] [-i wait] [-l preload] [-p pattern][-s packetsize]
<host>
Parameters
-c count Stop after sending count ECHO_REQUEST packets. With deadline option, ping waits for
count ECHO_REPLY packets, until the timeout expires.
-i wait Wait interval of seconds between sending each packet. The default is to wait for one
second between each packet normally, or not to wait in flood mode. Only super-user may
set interval to values less 0.2 seconds.
-l preload If preload is specified, ping sends that many packets not waiting for reply. Only the
super-user may select preload more than 3.
-p pattern You may specify up to 16 “pad” bytes to fill out the packet you send. This is useful for
diagnosing data-dependent problems in a network. For example,
-p ff will cause the sent packet to be filled with all ones.
-s packetsize Specifies the number of data bytes to be sent. The default is 56, which translates into
64 ICMP data bytes when combined with the 8 bytes of ICMP header data.
host The name of the host to which the request packets are sent.
Example
WS5000> ping WS5000
PING WS5000 (10.1.1.101): 56 data bytes
64 bytes from 10.1.1.101: icmp_seq=0 ttl=255 time=0.037 ms
64 bytes from 10.1.1.101: icmp_seq=1 ttl=255 time=0.042 ms
64 bytes from 10.1.1.101: icmp_seq=2 ttl=255 time=0.05 ms
64 bytes from 10.1.1.101: icmp_seq=3 ttl=255 time=0.052 ms
8.3.16 remove
System Context
Removes specified log file.
Syntax
remove <filename> [username - optional]
Parameters
Example
WS5000.cfg>logdir
8.3.17 restore
System Context
Restores the specified system image and/or configuration, and then resets (reboots) the system with the newly
restored image and/or configuration.
Syntax
restore <restore_option> <filename>
Parameters
Example
WS5000>restore config siteconfig.cfg
This command will reset the system and boot up with the new configuration.
Do you want to continue (yes/no) : y
Restoring configuration from siteconfig.cfg
Restoring Wireless Network Management Configuration ...
This may take a few mins ...
Restoring configuration from siteconfig.cfg
Software Ver. : 1.4.1.0-003D
Starting the Wireless Switch 5000 ...
Licensed to : Symbol
Configuring ethernet ports ...
Done.
Done.
No TFTP server is present.
Max Mobile Clients
Exiting auto install script...
Active Switch
Starting system database ...Wireless Switch Policy
Done.
Starting switch processes ...
8.3.18 rfping
System Context
This performs a ping to the specified access port, using WNMP, for a specified number of times.
Syntax
rfping <mac address> [<count>]
Parameters
Example
WS5000> rfping 00:A0:F8:00:00:26 10
WS5000>
8.3.19 save
System Context
Saves the running system configuration to the specified file. Use directory to list the saved configuration files.
Syntax
save configuration <filename>
Parameters
filename The filename into which you want to save the running configuration. The .cfg extension
is automatically appended.
Example
WS5000> save configuration qwerty-config-14-dec
WS5000> directory
Date & Time Bytes File Name
8.3.20 service
System Context
Places the user in a Service Mode (for which a password is required). This is a command line mode used mostly
by Symbol technicians.
For more details on working within Service Mode, refer to the WS5000 Series Switch Troubleshooting Guide.
CLI Command Reference 8-23
Show the settings for the specified system component. There are a number of ways to invoke the show
command:
• Invoked without any arguments, show displays information about the current context. If the current
context contains instances, then show command (usually) displays a list of these instances.
In the case of the System/Configuration context, show displays all the possible show command
variations. Use show system command to show system information.
• Invoked with the display_parameter, it displays information about that component.
Syntax
show [ display_parameter ]
Example
WS5000.(Cfg)> show wlan
WS5000 > show system
Parameters
Table 8.4 lists and describes the display_parameters in the show command.
Table 8.4 show command’s display_parameter Summary
Display_parameter Description Context Example
show accessports Displays details of all access ports or available system / cfg page 8-25
access ports
show allconfig Displays all configurations on the switch system page 8-26
show appolicy Displays Access Port Policy system / cfg page 8-26
show cfghistory Displays configuration change history system / cfg page 8-27
show channelinfo Displays channel no and country code details system / cfg page 8-28
show configaccess Displays configured system access restrictions system / cfg page 8-32
show ethernet Displays Ethernet Port details system / cfg page 8-32
show events Show Syslog event details system / cfg page 8-32
show history Dispay previously executed CLI commands cfg page 8-34
show host Displays the Hosts defined in the system system / cfg page 8-34
show https Displays the Applet access type (http/https). system / cfg page 8-34
show knownap Displays known APs in the neighborhood. system / cfg page 8-35
show radius-server Displays Radius information for authenticating system / cfg page 8-36
management users logins (to manage the WS5000
switch)
show rfthreshold Display RF Stats Threshold Values for SNMP traps cfg page 8-37
show securitypolicy Displays security policy details system / cfg page 8-38
show snmpclients Displays the SNMP Client/community details system / cfg page 8-39
show sysalerts Displays system alert logs (events) system / cfg page 8-40
show time Displays date and time information system / cfg page 8-41
show traphosts Displays the SNMP trap-host details system / cfg page 8-41
show tunnels Displays the configured GRE on the system system / cfg page 8-41
show version Displays the system version details system / cfg page 8-42
show vpnsupportstatus Displays vpn support status system / cfg page 8-42
show wme Displays WME Profile details system / cfg page 8-43
show WSrfstats Display RF statistics for Wireless Switch (WS) cfg page 8-43
Available ACLs:
1. New ACL.
Autoinstall log
Symbol Wireless Switch WS 5000 Series.
Please enter your username and password to access the Command Line Interface.
userid:
password:
System information...
System Name : primarynew
Description : WS5000 Wireless Network
Switch Location :
Software Ver. : 2.1.0.0-012B
Licensed to : Symbol Technologies
Copyright : Copyright (c) 2000-2005. All rights reserved.
8.4.8 show ce
WS5000> show ce
Classifier information...
Available Classifiers (CE):
1. Ex HTTP Traffic.
2. Ex Telnet Traffic.
3. RTP_Data.
4. Spectra_Link_Phone.
5. VoIP_Call_Setup_In.
6. VoIP_Call_Setup_Out.
7. VoIP_Ext_Services_Out.
8. VoIP_Ext_Services_In.
9. VoIP_RAS_In.
10. VoIP_RAS_Out.
11. New HTTP Traffic Classifier.
Note To view the config change history, enable snmptrap for “Switch configuration
changed “under Events context.
Note To view the config change history you have to enable snmptrap for “Switch
configuration changed “under Events context.
8.4.10 show cg
WS5000> show cg
Classification Group information...
Available Classification Groups:
1. NetVision_VoIP_In.
2. NetVision_VoIP_Out.
3. New Classification Group.
A Ch: 149,153,157,161,165
Costa Rica CR B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80
A Ch:
Croatia HR B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Cyprus CY B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
Czech Republic CZ B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
Denmark DK B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
Ecuador EC B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80
A Ch: 149,153,157,161,165
Egypt EG B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Estonia EE B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
Finland FI B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
France FR B Ch: 1-13 G Ch: 1-13 FH Ch: 48-82
A Ch: 36,40,44,48,52,56,60,64
Germany DE B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
Greece GR B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
Guatemala GT B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80
A Ch:
Hong Kong HK B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,149,153,157,161,1
65
Hungary HU B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
Iceland IS B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
India IN B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Indonesia ID B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Ireland IE B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
Israel IL B Ch: 5-8 G Ch: 5-8 FH Ch: 20-54
A Ch:
Italy IT B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
Japan JP B Ch: 1-14 G Ch: 1-14 FH Ch: 73-95
A Ch: 34,38,42,46
Jordan JO B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Kazakhstan KZ B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Kuwait KW B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
8-30 WS 5000 Series System Reference
A Ch:
A Ch: 36,40,44,48,52,56,60,64
Slovenia SI B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
South Africa ZA B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
South Korea KR B Ch: 1-13 G Ch: 1-13 FH Ch: 54-76
A Ch:
Spain ES B Ch: 1-13 G Ch: 1-13 FH Ch: 47-73
A Ch: 36,40,44,48,52,56,60,64
Sri Lanka LK B Ch: 1-2 G Ch: 1-2 FH Ch: 2-80
A Ch:
Sweden SE B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
Switzerland CH B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
Taiwan TW B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
52,56,60,64,100,104,108,112,116,120,124,1
28,132,136,140,149,153,157,161
Thailand TH B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Turkey TR B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
UAE AE B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Ukraine UA B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
United Kingdom GB B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,100,104,108,112,1
16,120,124,128,132,136,140
United States US B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80
A Ch:
36,40,44,48,52,56,60,64,149,153,157,161,1
65
Uruguay UY B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Venezuela VE B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80
A Ch: 149,153,157,161,165
Vietnam VN B Ch: 1-12 G Ch: 1-12 FH Ch: 2-80
A Ch:
WS5000.(Cfg)>
WS5000.(Cfg).Event>
8-34 WS 5000 Series System Reference
WS5000>
List of all active KDC users (MUs & WLANs): No active Users available.
LAN information:
LAN details...
Name : LAN1
Description : Public LAN
ep : 1
np :
allow : https http telnet ftp
deny :
NAT list:
8.4.25 show mu
WS5000.(Cfg)> show mu
# of MUs: 1
MU : MU_0 ESSID: kris
Power Mode VLAN Uptime Time left Last Activity Session Username
---------- ---- ------ --------- ------------- ----------------
CAM Mode NA 2267 sec 0 sec 21 sec NA
Statistics Transmitted Received
---------- ----------- --------
Packets : 34 2545
Bytes : 4578 600
WS5000.(Cfg)>
# of MUs: 1
# MU-MAC-Address MU-IP AP-NAME ESSID
1 00:0F:3D:E9:A6:6A 157.235.208.93 00:A0:F8:5A:B3:1B [B] kris
Associated(2327 sec.), Last Activity=21 sec., SNR=0 dB, #Roams=33
8.4.27 show np
WS5000> show np
8.4.28 show po
WS5000> show po
where:
<radioname|radioindex> {<radioname>|<radioindex>} : adopted Radioname
or Radioindex.
Example:
show rfstats radioindex 1
Ap Threshold details :
Status : disabled
Min Packets for RF Traps : Not Set
Packets Per Second : Not Set
Throughput in Mbps : Not Set
Average Bit Speed in Mbps : Not Set
Percent of NUCast Packets : Not Set
Average Signal in Dbm : Not Set
Average Retries : Not Set
Percent of Dropped Packets : Not Set
Percent of Undecryp Packets : Not Set
Number of Associated MUs : Not Set
Mu Threshold details :
Status : disabled
Min Packets for RF Traps : Not Set
Packets Per Second : Not Set
Throughput in Mbps : Not Set
Average Bit Speed in Mbps : Not Set
Percent of NUCast Packets : Not Set
Average Signal in Dbm : Not Set
Average Retries : Not Set
Percent of Dropped Packets : Not Set
Percent of Undecryp Packets : Not Set
8-38 WS 5000 Series System Reference
Route Management:
AP300’s
-------
00:A0:F8:00:00:26
00:A0:F8:BF:8A:9F
CLI Command Reference 8-39
Sensor AP’s
-----------
WS5000.(Cfg).sensor>
WS5000.(Cfg)>
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Disabled
Standby Management:
Interface (Ethernet) 1
----------------------
StandBy Heart-Beat MAC : Auto Discovery Enabled
Heart-Beat status : Enable
Received Heart-Beat : No
8-40 WS 5000 Series System Reference
Interface (Ethernet) 2
----------------------
StandBy Heart-Beat MAC : Auto Discovery Enabled
Heart-Beat status : Disable
Received Heart-Beat : No
WS5000.(Cfg)>
Time Zone :
(GMT -08:00) Pacific Time (US & Canada); Tijuana
Tunnel details...
Available Users:
1. admin.
Version details:
---------------
Hardware Version : CC-5000
Firmware Version : 2.2(date 07/09/02)
Software Version : 2.1.0.0-012B
Release date : Fri Jan 6 16:39:44 IST 2006
CLI Version : 08a
MIB Version : v24b07
XML Version : 08a
WS5000.(Cfg)>
WS5000.(Cfg)>
WTLS Settings:
Server number: : 1
Security mode: : defaultSecurity
Wanted FIPS mode: : Unavailable
Cipher: : AES128
MAC: : SHA_160
Minimum client RSA key size: : 1024 bits
Maximum client RSA key size: : 4096 bits
Minimum RSA key size: : 1024 bits
Maximum RSA key size: : 4096 bits
Handshake timeout: : 0h 1m( 90 secs)
Require client certificates: : false
Key refresh: : 256 packets
WVPN Management:
WVPN available : true
WVPN Status : Stopped
WVPN Server Address : 10.1.1.101 / 157.235.208.167
WVPN Server Port : 9102
WVPN Unused session timeout : 48h 0m (172800 secs)
WVPN Debug level : Debug Info Disabled
WVPN DOS Support : no
WVPN DOS Port : 9103
WVPN Client keep alive : 10 seconds
8-44 WS 5000 Series System Reference
copy Copy files between the Switch and TFTP/FTP server. page 8-52
export Exports log files from the Switch to TFTP server. page 8-59
8-46 WS 5000 Series System Reference
purge It clears the specified contents from memory only. It does not delete page 8-65
any files. Use logdir to view user log files and remove to delete user
log files.
radius Display the Radius authentication status on the switch. page 8-66
rougeap Configure RogueAP Detection feature for the system. page 8-68
runacs Run Automatic Channel Scan (ACS) on all adopted Access Ports. page 8-69
sensor Configure the Sensors setting, including default sensor settings. page 8-70
8.5.1 .. or end
Configuration (Cfg) Context
Terminates the context or instance session, and changes the command prompt to move up by one context.
Syntax
..
or
end
or
exit
Parameters
None.
Example
WS5000.(Cfg).NP> ..
WS5000.(Cfg)> end
WS5000>
8.5.2 exit
Configuration (Cfg) Context
Terminates the context session, and returns the prompt to the root.
For example, if you use the exit command in the ACL context, the prompt reverts to the System context prompt.
Syntax
exit
Parameters
None.
Example
WS5000.(Cfg).ACL> exit
WS5000>
8-48 WS 5000 Series System Reference
8.5.3 ? or help
Configuration (Cfg) Context
Retrieves a list of commands supported in a given the context or instance.
Syntax
?
or
help
Parameters
None.
Example
WS5000> ?
or
WS5000> help
8.5.5 aaa
Configuration (Cfg) Context
Display the current aaa settings managed by the switch.
Syntax
aaa
Parameters
None
Example
WS5000.(Cfg)> aaa
WS5000.(Cfg).AAA>
8.5.6 accessport
Configuration (Cfg) Context
Display the current access ports being managed by the switch. Also, the context is changed to the Access Port
(APort) Context. See page 8-118 for more details.
Syntax
accessport
Parameters
None.
Example
WS5000.(Cfg)> accessport
WS5000.(Cfg).APort>
8.5.7 acl
Configuration (Cfg) Context
Display the currently available access control lists (ACLs) for the switch. Also, the context is changed to the
Access Control List (ACL) Context. See page 8-129 for more details.
Syntax
acl
Parameters
None.
Example
WS5000.(Cfg)> acl
Available ACLs:
1. New ACL.
WS5000.(Cfg).ACL>
8-50 WS 5000 Series System Reference
8.5.8 appolicy
Configuration (Cfg) Context
Display the currently available access port policies for the switch. Also, the context is changed to the Access
Port Policy (APPolicy) Context. See page 8-136 for more details.
Syntax
appolicy
Parameters
None.
Example
WS5000.(Cfg)> appolicy
WS5000.(Cfg).APPolicy>
8.5.9 banner
Configuration (Cfg) Context
Use this to configure a Banner for the system
Syntax
banner
Parameters
None
Example
WS5000.(Cfg)> banner
WS5000.(Cfg).Banner>
8.5.10 ce
Configuration (Cfg) Context
Display list of classifiers available for configuration. Also, the context is changed to the Classifier Context (CE).
See page 8-155 for more details.
Syntax
ce <ce_name>
CLI Command Reference 8-51
Parameters
Example
WS5000.(Cfg)> ce
Classifier information...
WS5000.(Cfg).CE>
8.5.11 cg
Configuration (Cfg) Context
Display the list of currently available classification group for the switch. Also, the context is changed to the
Classification Group (CG) Context. See page 8-163 for more details.
Syntax
cg
or
cg_name
Parameters
None.
Example
WS5000.(Cfg)> cg
Classification Group information...
WS5000.(Cfg).CG>
8.5.12 chassis
Configuration (Cfg) Context
Display the currently available chassis environmental details for the switch. Also, the context is changed to
the Chassis Context. See page 8-170 for more details.
8-52 WS 5000 Series System Reference
Syntax
chassis
Parameters
None.
Example
WS5000.(Cfg)> chassis
WS5000.(Cfg).Chassis>
8.5.13 clear
Configuration (Cfg) Context
Clear the screen of all running command input and output entries.
Syntax
clear
Parameters
None.
Example
WS5000> clear
8.5.14 copy
Configuration (Cfg) Context
Copies a file from the switch to a (T)FTP server, or vice versa. The following types of files can be transferred
via TFTP or FTP:
• *.sys.img
• *.cfg
• *.sym
• *.krb (FTP only)
IMPORTANT! DO NOT USE THIS COMMAND FOR FILES LARGER THAN 32MB.
!
CLI Command Reference 8-53
Syntax
For TFTP:
copy <source> <destination>
For FTP:
copy <source> <destination> [ -u <ftp_user> ] [ -m <ftp_mode> ]
Parameters
Example
WS5000.(Cfg)> copy tftp system
Enter the file name to be copied from TFTP server : backup.sys.img
IP address of the TFTP server : 10.1.1.1
Copying 'backup.sys.img' from tftp://10.1.1.1 to Switch...
or
WS5000.(Cfg)> copy ftp://100.10.10.1/ftpimages/DefaultConfig.cfg system
Copying 'DefaultConfig.cfg' from ftp://100.10.10.1/ftpimages/ to Switch...
8.5.15 date
Configuration (Cfg) Context
Display or sets the system time and date. When no parameters, this command displays the time/date currently
set. Otherwise, it modifies the time/date based on the specified parameters.
Syntax
date [time_format] [time_zone]
8-54 WS 5000 Series System Reference
Parameters
time_zone Valid range is -12:00 to +13:00 [+/-](HH:MM), where 0.00 is Greenwich Mean Time. Note
that the ‘+’ must be included for positive timezone values.
Example
WS5000.(Cfg)> date 200502110245.11 -08:00 1
Time Zone :
(GMT -08:00) Pacific Time (US & Canada); Tijuana
WS5000.(Cfg)> date
Time Zone :
(GMT -08:00) Pacific Time (US & Canada); Tijuana
8.5.16 delete
Configuration (Cfg) Context
Deletes the specified image or config file from the switch. Use the directory command to list the files that can
be deleted.
Syntax
delete <filename>
Parameters
Example
WS5000.(Cfg)> directory
Date & Time Bytes File Name
8.5.17 description
Configuration (Cfg) Context.
Sets a description to the policy of the item in the selection.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg)> description “Created 7-14-05”
8.5.18 directory
Configuration (Cfg) Context
Lists the image and configuration files that are stored on the WS5000.
Syntax
directory
Parameters
None.
Example
WS5000.(Cfg)> directory
Date & Time Bytes File Name
WS5000.(Cfg)>
8-56 WS 5000 Series System Reference
8.5.19 emergencymode
Configuration (Cfg) Context
Enables or disables the “Emergency” Switch Policy (ESP), a switch policy that can activated (enabled) at any
time in case of an emergency. When ESP is deactivated (disabled), the previous switch policy is reactivated.
To set the emergency policy, use the emergencymode command.
Syntax
emergencyMode <enable/disable>
Parameters
Example
WS5000.(cfg)> emergencymode enable
8.5.20 encrypt
Configuration (Cfg) Context
Use this command to get the encrypted password.This command encrypts CLI user passwords, kerberos user
passwords, service mode password, vpn simple auth password, radius secret, WEP keys.This encrypted
password is used in autoinstall command file.
Syntax
encrypt <password>
Parameters
Example
WS5000.(Cfg)> encrypt <symbol>
WS5000.(Cfg)>
8.5.21 ethernet
Configuration (Cfg) Context
Display the currently available ethernet ports for the switch. Also, the context is changed to the Ethernet Port
Context. See page 8-172 for more details.
Syntax
ethernet
Parameters
None.
CLI Command Reference 8-57
Example
WS5000.(Cfg)> ethernet
Available EtherPorts are:
Ethernet 1
Ethernet 2
WS5000.(Cfg).Ethernet>
8.5.22 etherpolicy
Configuration (Cfg) Context
Display the currently available ethernet policies applied to the switch. Also, the context is changed to the
Ethernet Policy (EtherPolicy) Context. See page 8-178 for more details.
Syntax
etherpolicy
Parameters
None.
Example
WS5000.(Cfg)> etherpolicy
WS5000.(Cfg).EtherPolicy>
8.5.23 events
Configuration (Cfg) Context
Display the event settings currently applied to the switch. Also, the context is changed to the Event Context.
See page 8-186 for more details.
Syntax
events
Parameters
None.
Example
WS5000.(Cfg)> events
WS5000.(Cfg).Event>
8.5.24 export
Configuration (Cfg) Context
This CLI is used to copy the log files from switch to remote TFTP server. Use logdir to view the list of user log
files that can be exported.
This is an interactive command and asks for
a. destination: Remote TFTP host
b. filename : Log file name to be exported to the remote TFTP server.
c. username : Enter the user name which you mentioned at the time of logfile creation
when using diag command.
Default user name is admin.
Syntax
export
Parameters
None.
Example
WS5000.(Cfg)> export
VPN is NOT supported ...
Creating the Event list...
Enter the log file name : WS5000
Enter the user name : admin
WS5000.(Cfg)>
8.5.25 ftp
Configuration (Cfg) Context
Display the FTP settings currently applied to the switch. Also, the context is changed to the FTP Context. See
page 8-198 for more details.
8-60 WS 5000 Series System Reference
Syntax
ftp
Parameters
None.
Example
WS5000.(Cfg)> ftp
WS5000.(Cfg).FTP>
8.5.26 fw
Configuration (Cfg) Context
This CLI is used to configure Firewall and port filter rules.
Syntax
fw
Parameters
None
Example
WS5000.(Cfg)> fw
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
WS5000.(Cfg)> fw
8.5.27 host
Configuration (Cfg) Context
Display the host settings currently applied to the switch. Also, the context is changed to the Host Context. See
page 8-209 for more details.
Syntax
host
Parameters
None.
Example
WS5000.(Cfg)> host
8.5.28 install
Configuration (Cfg) Context
Configures the switch’s failover role as Primary or Standby, and applies all settings specified in the command
file (.sym). Alternatively, this command is used to update Kerberos principal from a specified Kerberos file
(.krb), without reset.
Syntax
install <install_option> [filename]
Parameters
filename Command (*.sym) or Kerberos (*.krb) file to execute, which contains configuration
settings. By dafault, this is command.sym.
Example
WS5000.(Cfg)> install primary
Begin command file processing...
8.5.29 kdc
Configuration (Cfg) Context
Display the Kerberos Key Distribution Center (KDC) status/settings currently applied to the switch. Also, the
context is changed to the KDC Context. See page 8-214 for more details.
The KDC context provides configuration options to configure the switch-resident KDC as a Master or Slave.
Syntax
kdc
Parameters
None.
Example
WS5000.(Cfg)> kdc
List of all active KDC users (MUs & WLANs): No active Users available.
WS5000.(Cfg).KDC>
8.5.30 logdir
Configuration (Cfg) Context
This CLI is used to list available user log (history, syslog) files. It does not list image/config files.
Use dir command to list image/config files.
Syntax
logdir
or
logdir user <username>
Parameters
Example
WS5000.(Cfg)> ..
WS5000> service
Enter CLI Service Mode password: ********
Enabling CLI Service Mode commands...... done.
SM-WS5000> cfg
SM-WS5000.(Cfg)> logdir
8.5.31 name
Configuration (Cfg) Context
Use the name command to change the system name.
Syntax
name <system_name>
Parameters
Example
WS5000.(Cfg)> name MiamiWS5000
Configuring name...
Status : Success.
MiamiWS5000.(Cfg)>
8.5.32 np
Configuration (Cfg) Context
Display the currently available network policies on the switch. Also, the context is changed to the Network
Policy (NP) Context. See page 8-222 for more details.
Syntax
np
Parameters
None.
Example
WS5000.(Cfg)> np
Network Policy information
WS5000.(Cfg).NP>
8.5.33 ping
System Context, Configuration (Cfg) Context, Host Context
Sends ICMP ECHO_REQUEST packets to a network host.
Syntax
ping <host/ip_address>
options:ping [-Rdfnqrv] [-c count] [-i wait] [-l preload] [-p pattern][-s packetsize] <host/IP_address>
8-64 WS 5000 Series System Reference
Parameters
-c count Stop after sending count ECHO_REQUEST packets. With deadline option, ping waits for
count ECHO_REPLY packets, until the timeout expires.
-i wait Wait interval of seconds between sending each packet. The default is to wait for one
second between each packet normally, or not to wait in flood mode. Only super-user may
set interval to values less 0.2 seconds.
-l preload If preload is specified, ping sends that many packets not waiting for reply. Only the
super-user may select preload more than 3.
-p pattern You may specify up to 16 “pad” bytes to fill out the packet you send. This is useful for
diagnosing data-dependent problems in a network. For example,
-p ff will cause the sent packet to be filled with all ones.
-s packetsize Specifies the number of data bytes to be sent. The default is 56, which translates into
64 ICMP data bytes when combined with the 8 bytes of ICMP header data.
host/IP_address The name or IP address of the host to which the request packets are sent.
Example
WS5000.(Cfg)> ping WS5000
PING WS5000 (10.1.1.101) from 10.1.1.101 : 56(84) bytes of data.
64 bytes from WS5000 (10.1.1.101): icmp_seq=1 ttl=64 time=0.068 ms
64 bytes from WS5000 (10.1.1.101): icmp_seq=2 ttl=64 time=0.028 ms
64 bytes from WS5000 (10.1.1.101): icmp_seq=3 ttl=64 time=0.031 ms
64 bytes from WS5000 (10.1.1.101): icmp_seq=4 ttl=64 time=0.029 ms
WS5000.(Cfg)>
CLI Command Reference 8-65
8.5.34 po
Configuration (Cfg) Context
Display the currently available policy object information on the switch. Also, the context is changed to the
Policy Object (PO) Context. See page 8-228 for more details.
Syntax
po
Parameters
None.
Example
WS5000.(Cfg)> po
Policy Object information......
WS5000.(Cfg).PO>
8.5.35 purge
Configuration (Cfg) Context
This CLI is used to clear the specified contents from memory only. It does not delete any files. Use logdir to
view user log files and remove to delete user log files.
Syntax
purge <purge_option> [radioname|radioindex <radioname>|<radioindex>]
Parameters
Example
1. To clear global history contents from memory, use
WS5000.(Cfg)> purge history
2. To clear RF statistics for all APs, use
WS5000.(Cfg)> purge rfstats
3. To clear RF statistics for specified AP, use
WS5000.(Cfg)> purge rfstats ap 1
WS5000.(Cfg)> purge rfstats ap <ap_mac>
8-66 WS 5000 Series System Reference
8.5.36 radius
Configuration (Cfg) Context
Display the Radius authentication status on the switch. Also, the context is changed to the Radius Context.
See page 8-235 for more details.
Syntax
radius
Parameters
None.
Example
WS5000.(Cfg)> radius
WS5000.(Cfg).Radius>
8.5.37 remove
Removes the user log files (the once listed by logdir cli command). If a log file is saved using a username,
then username option is used to remove it. It does not remove image/config or local syslog files.
Syntax
remove <file_name> [username-optional]
where username is optional and is the storage directory for the logs
Parameters
Example
WS5000.cfg>logdir
8.5.38 reset
Configuration (Cfg) Context
WS5000.(Cfg)> reset
Resets the switch. Resetting the switch includes a graceful shutdown, and reboot.
Syntax
reset
Parameters
None.
Example
WS5000.(Cfg)> reset
8.5.39 restore
Configuration (Cfg) Context
Restores the specified system image and/or configuration, and then resets (reboots) the system (based on the
restore_option) with the newly restored image and/or configuration.
Syntax
restore <restore_option> <filename>
Parameters
restore_option The type of restore to be invoked. image or configuration that you want to restore. One
of:
• system – Restores the system image and configuration from the specified file.
• configuration – Restores the configuration from the specified file.
• standby – Restores the standby configuration from the specified file.
filename The new system image or configuration file to be restored.
Example
WS5000.(Cfg)> restore config WS5000Defaults_v2.1.0.0-014B.cfg
This command will reset the system and boot up with the new configuration.
Do you want to continue (yes/no) : y
8.5.40 rougeap
Configuration (Cfg) Context
This CLI displays context specific attirbutes, rogue AP configuration, authorised AP rulelist and list of detector
APs. See Rogue AP Detection on page 1-22 for more details.
Syntax
rogueap
Parameters
None.
Example
WS5000.(Cfg)> rogueap
WS5000.(Cfg).rogueap>
8.5.41 route
Configuration (Cfg) Context
This CLI is used to configure system route settings.
Syntax
route
Parameters
None.
Example
WS5000.(Cfg)> route
Route Management:
WS5000.(Cfg).route>
CLI Command Reference 8-69
8.5.42 runacs
Configuration (Cfg) Context
Runs Automatic Channel Selection on all adopted access ports. See Automatic Channel Select on page 1-19
for more details.
Syntax
runacs
Parameters
None.
Example
WS5000.(Cfg)> runacs
WS5000.(Cfg)>
8.5.43 save
Configuration (Cfg) Context
Saves the running system configuration to the specified file. Use directory to list the saved configuration files.
Syntax
save configuration <filename>
Parameters
filename The filename into which you want to save the running configuration. The .cfg extension
is automatically appended.
Example
WS5000.(Cfg)> save conf sample
8.5.44 securitypolicy
Configuration (Cfg) Context
Display the security policy options available to the switch. Also, the context is changed to the Security Policy
Context. See page 8-243 for more details.
Syntax
securitypolicy
Parameters
None.
8-70 WS 5000 Series System Reference
Example
WS5000.(Cfg)> securitypolicy
WS5000.(Cfg).SecurityPolicy>
8.5.45 sensor
Configuration (Cfg) Context
Display details of all Sensors and the Active AP 300's.You can also configure the default sensor configuration
in this context.See 8.47 Sensor Context on page 252 for more details.
Syntax
sensor
Parameters
None.
Example
WS5000.(Cfg)> sensor
AP300's
-------
Sensor AP's
------------
1. 00:A0:F8:AA:BB:CC
WS5000.(Cfg).sensor>
8.5.46 set
Configuration (Cfg) Context
Displays the set commands for the different system component. There are a number of ways to invoke the set
command:
• When invoked within any system component context, set is used to configure the attributes for the
current context.
• When invoked within the system configuration context, it is used to set the information about various
system parameters.
Syntax
set <system_parameter>
Parameters
Table 8.6 lists and describes the display_parameters in the set command:
Table 8.6 set command’s display_parameter Summary
set muidletimeout Set the MU Idle Timeout value (for all MU's) page 8-75
set rfthreshold Set RF Stats threshold values for SNMP traps page 8-76
set logout Set CLI auto session logout time page 8-77
set arpcache
Configuration (Cfg) Context
Sets the address resolution display and control. The arp program displays and modifies the Internet-to-
Ethernet with no flags, the program displays the current ARP entry for hostname. The host may be specified
by name or by number, using Internet dot notation.
Syntax
set arpcache <command> <parameters>NAME
Parameters
hostname
-d hostname A super-user may delete an entry for the host called hostname with the -d flag.
-s hostname ether_addr Create an ARP entry for the host called hostname with the Ethernet address ether_addr.
[temp] [pub] [trail] The Ethernet address is given as six hex bytes separated by colons. The entry will be
permanent unless the word temp is given in the command. If the word pub is given, the
entry will be 'published'; i.e., this system will act as an ARP server, responding to
requests for hostname even though the host address is not its own. The word trail
indicates that trailer encapsulations may
be sent to this host.
8-72 WS 5000 Series System Reference
-f filename Causes the file filename to be read and multiple entries to be set in the ARP tables.
Entries in the file should be of the form hostname ether_addr [temp] [pub] [trail] with
argument meanings as given above.
Example
WS5000.(Cfg)> set arpcache -a
ARP Information:
WS5000.(Cfg)>
set emergencypolicy
Configuration (Cfg) Context
Sets a defined switch policy to be designated as the emergency switch policy (ESP). to the switch policy that
will assume the role of emergency switch policy (ESP). The ESP is provided as a means to quickly return to a
known, safe configuration.
Use the emergencymode command to enable or disable the ESP.
Note If the switch policy name includes “blank” spaces in the name, use quotation
marks within the command.
Syntax
set emergencypolicy <emergencypolicyname>
Parameters
emergencypolicyname Name of the switch policy to be designated as the emergency switch policy. To see
available switch policies, use the switchpolicy command.
Example
WS5000.(Cfg)> set emergencypolicy TestPolicy
WS5000.(Cfg)>
set autoinstall
Configuration (Cfg) Context
Used to enable / disable the autoinstall feature.
Syntax
set autoinstall {enable|disable}
Parameters
Example
WS5000.(Cfg)> set autoinstall enable
WS5000.(Cfg)>
set rfstats
Configuration (Cfg) Context
Enables/Disables RF statistics gathering for all or specific AP(s).It can take only one
radioname|radioindex at a time.
To enable RF statistics gathering for all active Radios, use
set rfstats enable
To enable RF statistics gathering for Radio at index 1, use
set rfstats radioindex 1 enable
Syntax
set rfstats <radioname|radioindex> {<radioname|radioindex>} {enable|disable}
Parameters
Example
WS5000.(Cfg)> set rfstats radioindex 1 enable
Success.
WS5000.(Cfg)>
set licensekey
Configuration (Cfg) Context
Sets the license key for the switch. The license key, issued by Symbol, is used to determine the number of APs
and MUs that the switch is able to support.
Syntax
set licensekey <licensekey>
CLI Command Reference 8-75
Parameters
licensekey The license key, issued by Symbol. The switch must be configured as “Primary” if
updating the license key.
Use the set mode command to set the switch mode, if not already set as Primary.
Example
WS5000.(Cfg)> set licensekey <licensekey>
set location
Configuration (Cfg) Context
Sets an informational location string for where the switch is located.
Syntax
set location <string>
Parameters
location Enter a string for where the switch is located, such as the NOC city, or campus building
#, for example. This information is displayed using the show system command.
Example
WS5000.(Cfg)> set location US
WS5000.(Cfg)>
set muidletimeout
Configuration (Cfg) Context
Use set muidletimeout to set the MU Idle Timeout value (for all MUs).
8-76 WS 5000 Series System Reference
MU idle timeout — It is the time for which each MU’s details ( which are associated) will retian in the switch
database. This helps MUs in PSP mode not ot get removed from the database till the timeout value expires.
The default value is 30 minutes.
Syntax
set muidletimeout <muIdleTimeout value>
Parameters
Example
WS5000.(Cfg)> set muidletimeout 88
WS5000.(Cfg)>
set rfthreshold
Configuration (Cfg) Context
Syntax
set rfthreshold <Type> <Thresholdname> <Thresholdvalue / reset>
Parameters
Type Placeholder for the type of RF threshold. It can be either AP, MU or Switch.
Thresholdname Placeholder for the threshold associated with each of the threshold type mentioned
above.
Thresholdvalue Place holder for the value that can be associated with each of the threshold name.
Example
WS5000.(Cfg)> set rfthreshold mu pps 100
Success.
CLI Command Reference 8-77
Mu Threshold details :
Status : disabled
Min Packets for RF Traps : Not Set
Packets Per Second : 100
Throughput in Mbps : Not Set
Average Bit Speed in Mbps : Not Set
Percent of NUCast Packets : Not Set
Average Signal in Dbm : Not Set
Average Retries : Not Set
Percent of Dropped Packets : Not Set
Percent of Undecryp Packets : Not Set
Note The threshold value for all the threshold names, except for average signal, can
be between zero and (no maximum limit).
Note The value for Average signal, measured in Dbm, must always be below zero
(negative value).
set logout
Configuration (Cfg) Context
Sets the CLI’s auto-logout time, in minutes.
Syntax
set logout <#minutes>
Parameters
#minutes CLI’s auto-logout time, in minutes. Valid values are 0 through 1440 (24 hours). Use 0 to
disable auto-logout.
Example
WS5000.(Cfg)> set logout 10
WS5000.(Cfg)>
set snmptrap
Configuration (Cfg) Context
Enables or disables SNMP traps, globally.
Syntax
set snmptrap <snmptrap_flag>
8-78 WS 5000 Series System Reference
Parameters
snmptrap_flag Indicates whether to enable or disable SNMP traps on the switch. Possible values are:
• enable
• disable
Example
WS5000.(Cfg)> set snmptrap enable
Setting SNMP Trap status....
Status: Success.
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Enabled
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Disabled
WS5000.(Cfg)>
set vpnsupport
Configuration (Cfg) Context
Used to enable or disable the VPN support.
Syntax
set vpnsupport enable|disable <license file>
Parameters
license_file Use this to enter the location for the VPN license file.
Example
WS5000.(Cfg)> set vpnsupport enable
WS5000.(Cfg)>
set switchpolicy
Configuration (Cfg) Context
Sets a defined switch policy to be designated as the active switch policy.
CLI Command Reference 8-79
Note If the switch policy name includes “blank” spaces in the name, use quotation
marks within the command.
Syntax
set switchpolicy <spolicy_name>
Parameters
spolicy_name Name of the switch policy to be designated as the active switch policy. To see available
switch policies, use the switchpolicy command.
Example
WS5000.(Cfg)> set switchpolicy "Default Wireless Switch Policy"
WS5000.(Cfg)>
set time
Configuration (Cfg) Context
Sets the system time and date based on the specified parameters.
Syntax
set time [time_format] [time_zone]
Parameters
time_zone Valid range is -12:00 to +13:00 [+/-](HH:MM), where 0.00 is Greenwich Mean Time. Note
that the ‘+’ must be included for positive timezone values.
Example
WS5000.(Cfg)> set time 200502110145.11 -08:00
Time Zone :
(GMT -08:00) Pacific Time (US & Canada); Tijuana
WS5000.(Cfg)>
set zone
Configuration (Cfg) Context
Sets the time zone, without changing the time and date.
Syntax
set zone <time_zone>
Parameters
time_zone Valid range is -12:00 to +13:00 [+/-](HH:MM), where 0.00 is Greenwich Mean Time. Note
that the ‘+’ must be included for positive timezone values.
Example
WS5000.(Cfg)> date
Time Zone :
(GMT -08:00) Pacific Time (US & Canada); Tijuana
WS5000.(Cfg)>
WS5000.(Cfg)> set zone -12:00
CLI Command Reference 8-81
Time Zone :
(GMT -12:00) Eniwetok, Kwajalein
WS5000.(Cfg)>
set clearstat
Configuration (Cfg) Context
Clears the packet statistics
Syntax
set clearstat
Parameters
none
Example
WS5000.(Cfg)> set clearstats
WS5000.(Cfg)>
8.5.47 show
Configuration (Cfg) Context
Display all the available commands within the Configuration context. Also, any of the show commands, with
an associated <display_parameter> will show a summary specific to the parameter.
Syntax
show
or
show [<display_parameter> [instance_name]]
Parameters
display parameter Categories of information related to the switch or the network components associated
with the switch. Possible values are listed in Table 8.4 on page 8-23.
Example
For a complete list of display parameters refer – show commands on page 8-23
8.5.48 shutdown
Configuration (Cfg) Context
Gracefully shuts down the switch. Before turning off the switch (power down), wait 10 seconds or more.
8-82 WS 5000 Series System Reference
After the switch has been shut down, bring it back up with a full power cycle (power down and then power
back up).
Syntax
shutdown
Parameters
None.
Example
WS5000.(Cfg)> shutdown
8.5.49 snmp
Configuration (Cfg) Context
Display the SNMP settings currently applied to the switch. Also, the context is changed to the SNMP Context.
See page 8-258 for more details.
Syntax
snmp
Parameters
None.
Example
WS5000.(Cfg)> snmp
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Disabled
WS5000.(Cfg).SNMP>
8.5.50 ssh
Configuration (Cfg) Context
Display the Secure Shell settings currently applied to the switch. Also, the context is changed to the SSH
(Secure Shell) Context. See page 8-269 for more details.
Syntax
ssh
CLI Command Reference 8-83
Parameters
None.
Example
WS5000.(Cfg)> ssh
WS5000.(Cfg).SSH>
8.5.51 ssl
Configuration (Cfg) Context
Display the Secure Socket Layer settings currently applied to the switch. Also, the context is changed to the
SSL (Secure Socket Layer) Context. See page 8-271 for more details.
Syntax
ssl
Parameters
None.
Example
WS5000.(Cfg)> ssl
WS5000.(Cfg).SSL>
8.5.52 standby
Configuration (Cfg) Context
Display the standby (failover) management settings currently applied to the switch. Also, the context is
changed to the Standby Context. See page 8-273 for more details.
Syntax
standby
Parameters
None.
Example
WS5000.(Cfg)> standby
Standby Management:
Interface (Ethernet) 1
----------------------
StandBy Heart-Beat MAC : Auto Discovery Enabled
Heart-Beat status : Enable
Received Heart-Beat : No
Interface (Ethernet) 2
----------------------
StandBy Heart-Beat MAC : Auto Discovery Enabled
Heart-Beat status : Disable
Received Heart-Beat : No
WS5000.(Cfg).StandBy>
8.5.53 switchpolicy
Configuration (Cfg) Context
Display the active and available switch policy currently defined on the switch. Also, the context is changed to
the Switch Policy (SPolicy) Context. See page 8-278 for more details.
Syntax
switchpolicy
Parameters
None.
Example
WS5000.(Cfg)> switchpolicy
Active Switch Policy name: Default Wireless Switch Policy
Available Switch Policies:
1. Default Wireless Switch Policy.
2. EmerPolicy2-10.
WS5000.(Cfg).SPolicy>
8.5.54 telnet
Configuration (Cfg) Context
Display the telnet accessibility settings currently defined on the switch. Also, the context is changed to the
Telnet Context. See page 8-291 for more details.
Syntax
telnet
Parameters
None.
Example
WS5000.(Cfg)> telnet
Telnet Status : Active.
Session inactivity timeout : 0 (Disabled)
WS5000.(Cfg).Telnet>
CLI Command Reference 8-85
8.5.55 tunnel
Configuration (Cfg) Context
Displays the GRE tunnels and the remote tunnel IP address that is used to map it to the WLAN. Only 4 GRE
tunnels can be configured in WS5000 switch. Also, the context changes to Tunnel Context. See page 8-294 for
more details.
Syntax
tunnel
Parameters
None.
Example
WS5000.(Cfg)> tunnel
Tunnel details...
Tunnel Name Remote IP Address
----------- -----------------
tunnel1 none
tunnel2 none
tunnel3 none
tunnel4 none
8.5.56 user
Configuration (Cfg) Context
Display the user accounts currently defined on the switch. Also, the context is changed to the User Context.
See page 8-298 for more details.
Syntax
user
Parameters
None.
Example
WS5000.(Cfg)> user
User information
Available Users:
1. admin.
2. techsupport.
WS5000.(Cfg).User>
8.5.57 wlan
Configuration (Cfg) Context
Display the WLAN settings currently defined on the switch. Also, the context is changed to the WLAN Context.
See page 8-305 for more details.
Syntax
wlan
Parameters
None.
8-86 WS 5000 Series System Reference
Example
WS5000.(Cfg)> wlan
WS5000.(Cfg).WLAN>
8.5.58 wme
Configuration (Cfg) Context
This CLI is used to displays and configure the various WME profiles.
Syntax
wme
Parameters
None.
Example
WS5000.(Cfg)> wme
WS5000.(Cfg).WME>
8.5.59 wvpn
Configuration (Cfg) Context
This CLI is used to display and configure system WVPN settings
Syntax
wvpn
Parameters
None.
Example
WS5000.(Cfg)> wvpn
WVPN Management:
WS5000.(Cfg)> wvpn
8-88 WS 5000 Series System Reference
8.6.1 acct
AAA Context
Used to set the IP, Port Number, Timeout Value, and the Max Retry values for the Radius accounting server.
Syntax
acct <name/IP> <portNum> <timeoutVal> <retryVal>
acct host <IPAddr>
acct port <portNum>
acct timeout <timeoutVal>
acct retry <retryVal>
acct show
acct secret
CLI Command Reference 8-89
Parameters
TimeoutVal The time out value thats set for the switch after which it stops attempting to connect to
the Radius accounting server.
retryVal The number a tries the switch attempts to contact the Radius server.
Example
WS5000.(Cfg).AAA> acct 156.5.0.0 10 3 4
8.6.2 client
AAA Context
Configures client parameters.
Syntax
client
Parameters
None
Example
WS5000.(Cfg).AAA> client
Client information
WS5000.(Cfg).AAA.Client>
8.6.3 disable
AAA Context
Disables the AAA server settings.
Syntax
Disable
Parameters
None
Example
WS5000.(Cfg).AAA> disable
8-90 WS 5000 Series System Reference
8.6.4 eap
AAA Context
To configure EAP parameters, use the Eap command.
Syntax
eap
Parameters
None
Example
WS5000.(Cfg).AAA> eap
EAP Configurations :
-----------------------------
EAP Type peap
Private key password wwwww
8.6.5 enable
AAA Context
To start the AAA Server settings, use the enable command.
Syntax
enable
Parameters
None
Example
WS5000.(Cfg).AAA> enable
8.6.6 ldap
AAA Context
To configure LDAP parameters, use the ldap command.
Syntax
ldap
CLI Command Reference 8-91
Parameters
None
Example
WS5000.(Cfg).AAA> ldap
LDAP information
8.6.7 policy
AAA Context
To configure acceess policy for a group, use the policy command.
Syntax
policy
Parameters
None
Example
WS5000.(Cfg).AAA> policy
WS5000.(Cfg).AAA.Policy>
8.6.8 proxy
AAA Context
To configure proxies and proxy parameters, use the proxy command.
Syntax
proxy
Parameters
None
Example
WS5000.(Cfg).AAA> proxy
Proxy information
Available Proxy Servers:
1.symbol.
WS5000.(Cfg).AAA.Proxy>
8-92 WS 5000 Series System Reference
8.6.9 save
AAA Context
To restart the AAA Server with the new configuration settings, use the save command.
Syntax
save [CR]
Parameters
None
Example
WS5000.(Cfg).AAA> save
8.6.10 set
AAA Context
To configure the AAA Server database type, use the set command.
Syntax
set dbtype <value>
Parameters
Example
WS5000.(Cfg).AAA> set dbtype ldap
8.6.11 show
AAA Context
Table 8.8 lists the show commands.
Table 8.8 Show Commands
Command Description
8.6.12 userdb
AAA Context
To configure a user database for the AAA server, use the userdb command.This command leads you to userdb
context. Refer to AAA User Database Context for more information on userdb.
Syntax
userdb
Parameters
None
Example
Refer to AAA User Database Context for more information on userdb.
8-94 WS 5000 Series System Reference
8.7.1 add
AAA Client Context
To add a new client, use the add command.
Syntax
add <client_name> <ip_address> <netmask> <secret>
Parameters
secret USed to encrypt packets between the RADIUS server (switch) and the RADIUS
client.
Example
WS5000.(Cfg).AAA.Client> add new 1.1.1.1 255.0.0.0 secret
Adding Client...
Status: Success.
Client information
Warning: Please commit these changes using Save command in AAA context.
CLI Command Reference 8-95
8.7.2 remove
AAA Client Context
To remove a RADIUS client from the WS5000 Series Switch, use the remove command.
Syntax
remove <client_name> [CR]
Parameters
Example
WS5000.(Cfg).AAA.Client> remove new
Removing Client...
Status: Success.
Client information
Warning: Please commit these changes using Save command in AAA context.
8.7.3 show
AAA Client Context
To display list of clients or attributes of a specific client, use the show command.
Syntax
show — Display context specific attributes
show clients
Parameters
Example
WS5000.(Cfg).AAA.Client> show client
Client information
Client information
Client IP 157.235.208.186
Client Secret WS5000
Client Netmask 255.255.255.0
8-96 WS 5000 Series System Reference
8.8.1 import
AAA EAP Context
To set server and CA Certificate paths, use the import command.
Syntax
Import <servcert/cacert> <path>
Parameters
Example
WS5000.(Cfg)> aaa
WS5000.(Cfg).AAA> eap
EAP Configurations :
-----------------------------
EAP Type peap
Private key password WS5000
CLI Command Reference 8-97
Warning: Please commit these changes using Save command in AAA context.
CA Certficate
-------------
Issuer /C=IN/ST=Karnataka/L=Bangalore/O=Symbol Technologies India
P
vt Ltd/OU=Testing and Validation/CN=ROOT/emailAddress=KumarBes@symbol.com
Serial Number AB111ABF223AA1A1
Valid From Jan 3 08:20:34 2006 GMT
Valid Till Feb 2 08:20:34 2006 GMT
WS5000.(Cfg).AAA.EAP>
8.8.2 peap
AAA EAP Context
To configure PEAP parameters, use the peap command.
Syntax
peap
Parameters
None
Example
WS5000.(Cfg).AAA.EAP> peap
PEAP Configurations :
-----------------------------
PEAP Type mschapv2
WS5000.(Cfg).AAA.EAP.PEAP>
8.8.3 set
AAA EAP Context
To set the EAP type and private key password, use the set command.
Syntax
set eaptype <peap/ttls>
set keypassword <password>
Parameters
Example
WS5000.(Cfg).AAA.EAP> set eaptype peap
Configuring AAA EAP server...
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.EAP>
8.8.4 show
Use the show command to display context specific attributes.
Syntax
show [display_parameter]
Parameters
Example
WS5000.(Cfg).AAA.EAP> show eap-config
EAP Configurations :
-----------------------------
EAP Type ttls
Private key password 123
WS5000.(Cfg).AAA.EAP>
8.8.5 ttls
AAA Context
Use ttls context to configure TTLS parameters.
Syntax
ttls
Parameters
None
CLI Command Reference 8-99
Example
WS5000.(Cfg).AAA.EAP> ttls
TTLS Configurations :
-----------------------------
TTLS Type mschapv2
WS5000.(Cfg).AAA.EAP.TTLS>
8-100 WS 5000 Series System Reference
8.9.1 set
AAA LDAP Context
To configure a LDAP server components, use the set command.
Syntax
set <config_parameter> <parameter_value>
Parameters
Example
WS5000.(Cfg).AAA.LDAP> set ip 1.1.1.1
Configuring LDAP Server...Success.
LDAP information
Warning: Please commit these changes using Save command in AAA context.
8.9.2 show
AAA LDAP Context
To display LDAP information, use the show ldap command.
Syntax
show
or
show ldap
Parameters
Example
WS5000.(Cfg).AAA.LDAP> show ldap
LDAP information
{Ldap-UserDn}))(&(objectClass=GroupOfUniqueNames)(uniquemember=%{Ldap-UserDn})))
8.10.1 add
AAA Policy Context
To add a new WLAN to a group, use the add command.
Syntax
add wlan <group> <wlan-name>
Parameters
Example
WS5000.(Cfg).AAA.Policy> add wlan ws5k xyz
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.Policy>
8.10.2 remove
AAA Policy Context
To remove a policy from a group, use the remove command.
8-104 WS 5000 Series System Reference
Syntax
remove <group> <wlan>
Parameters
Example
WS5000.(Cfg).AAA.Policy> remove ws5k NewWlan
Configuring Policies..
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.Policy> show policies ws5k
Policy information
WLAN Policies:
1. xyz.
Days Policy: Sa-Su-Mo
StartTime Policy: 1000
EndTime Policy: 2200
8.10.3 set
AAA Policy Context
To set new time restrictions to a group, use the set command.
Syntax
set days <group> <attribute>
set time <group> <starttime> <endtime>
Parameters
Th Thursday
Fr Friday
Sa Saturday
Su Sunday
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.Policy> set time ws5k 1000 2200
Warning: Please commit these changes using Save command in AAA context.
8.10.4 show
AAA Policy Context
To view access policies attached to a group, use the show command.
Syntax
show policies [groupname]
Parameters
Example
WS5000.(Cfg).AAA.Policy> show policies ws5k
Policy information
WLAN Policies:
1. NewWlan.
2. xyz.
Days Policy: Sa-Su-Mo
StartTime Policy: 1000
EndTime Policy: 2200
8-106 WS 5000 Series System Reference
Commands Description
8.11.1 add
AAA Proxy Context
Use add to add a new Proxy.
Syntax
add <proxy_name> <suffix> <ip_address> <port> <secret>
Parameters
suffix Suffix
auth-server_ip AuthIP
port Port
Example
WS5000.(Cfg).AAA.Proxy> add NewProxy symbol.com 1.1.1.1 1812 secret
Adding Proxy...
Status: Success.
Proxy information
Available Proxy Servers:
1. NewProxy.
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.Proxy>
CLI Command Reference 8-107
8.11.2 remove
AAA Proxy Context
Use remove to remove a Proxy from the system.
Syntax
remove <proxyname> [CR]
Parameters
Example
WS5000.(Cfg).AAA.Proxy> remove NewProxy
Removing Proxy...
Status: Success.
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.Proxy>
8.11.3 set
AAA Proxy Context
Use set to set Proxy configurations.
Syntax
set retry-delay <retry delay:5-10>
set retry-count <retry count:3-6>
Parameters
retry_delay The delay period you set for the proxy to attempt a retry.
Example
WS5000.(Cfg).AAA.Proxy> set retry-delay 6
Warning: Please commit these changes using Save command in AAA context.
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.Proxy>
8-108 WS 5000 Series System Reference
8.11.4 show
AAA Proxy Context
Use d to display the current Proxy settings.
Syntax
show
show proxy
show config-proxy
Parameters
Example
WS5000.(Cfg).AAA.Proxy> show config-proxy
Proxy information
-----------------
Retry Count 3
Retry Delay 6 (seconds)
Proxy information
Proxy Suffix symbol.com
Proxy Auth Server IP 1.1.1.1
Proxy Secret secret
Proxy Port 1812
CLI Command Reference 8-109
Commands Description
8.12.1 group
AAA User Database - Group Context
This is a sub-context of userdb context. Use group to configure Group parameters.You can add and remove
Groups, using the group command.
Use AAA.userdb.Group context to
• add a new group to the system
• add a user to group
• remove a RADIUS group from the system
• remove a user from group
Syntax
group [CR]
Parameters
None
Example
WS5000.(Cfg).AAA.userdb.Group> add newGroup1
Group information
Available Groups:
1. newGroup1.
Group information
Available Policies for this group:
8-110 WS 5000 Series System Reference
WLAN Policies:
StartTime Policy : 0000
EndTime Policy : 2359
Days Policy : Any
WS5000.(Cfg).AAA.userdb.Group.[newGroup1]>
Note You need to enter into the Group sub-context level to add/remove a User/
Group.
8.12.2 user
AAA User Database - User Context
This is a sub-context of userdb context.To add and remove users, use the user command.Use
AAA.userdb.Group context to
• Add a new user to the system
• Add a User to Group.
• Remove a RADIUS User from the system
• Remove a User from Group
• Configure the Userdb
Syntax
user [CR]
Parameters
None
Example
WS5000.(Cfg).AAA.userdb.User> add newUser1
Enter User Password : ******
Re-Enter User Password : ******
Warning: Please commit these changes using Save command in AAA context.
WS5000.(Cfg).AAA.userdb.User>
Note You need to enter into the Group sub-context level to add/remove a User/
Group.
CLI Command Reference 8-111
Commands Description
8.13.1 add
AAA User Database - Group Context
Use add to add a new group to the system.
Syntax
add <group_name>
Parameters
group_name Name of the Group.
Example
WS5000.(Cfg).AAA.userdb.Group> add newgroup
Warning: Please commit these changes using Save command in AAA context.
Status: Success.
Group information
Available Groups:
1. ws5k.
8-112 WS 5000 Series System Reference
2. newgroup.
Group information
WLAN Policies:
StartTime Policy : 0000
EndTime Policy : 2359
Days Policy : Any
WS5000.(Cfg).AAA.userdb.Group.[newgroup]>
8.13.2 adduser
AAA User Database - Group Context
Use adduser to add a user to a group.
Syntax
adduser <user> <group>
Parameters
Example
WS5000.(Cfg).AAA.userdb.User> adduser new ws5k
Configuring Userdb...
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
8.13.3 group
AAA User Database - Group Context
Use group to select group to configure.
Syntax
group <group_name>
Parameters
group name Displays the name of the group that you want to configure.
Example
WS5000.(Cfg).AAA.userdb.Group> group ws5k
Group information
WLAN Policies:
CLI Command Reference 8-113
1. xyz.
StartTime Policy : 1000
EndTime Policy : 2200
Days Policy : Sa-Su-Mo
WS5000.(Cfg).AAA.userdb.Group.[ws5k]>
8.13.4 remove
AAA User Database - Group Context
Use remove to remove a RADIUS group from the system.
Syntax
remove <group_name> [CR]
Parameters
group name The RADIUS group that you want to remove from the system.
Example
WS5000.(Cfg).AAA.userdb.Group> remove newgroup
Removing Group...
Status: Success.
Group information
Available Groups:
1. ws5k.
Warning: Please commit these changes using Save command in AAA context.
8.13.5 remuser
Use remuser to remove a user from a group
Syntax
remuser <user> <group>
Parameters
User user name that you want to remove from the group.
Example
WS5000.(Cfg).AAA.userdb.User> remuser abc ws5k
Configuring Userdb...
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
8-114 WS 5000 Series System Reference
8.14.1 add
AAA User Database - User Context
Use add to add a new User to the system.
Syntax
add <user_name>
Parameters
user_name Name of the User.
Example
WS5000.(Cfg).AAA.userdb.User> add new
Enter User Password : ******
Re-Enter User Password : ******
Warning: Please commit these changes using Save command in AAA context.
CLI Command Reference 8-115
8.14.2 adduser
AAA User Database - User Context
Use adduser to add a user to a group
Syntax
adduser <user> <group>
Parameters
Example
WS5000.(Cfg).AAA.userdb.User> adduser new ws5k
Configuring Userdb...
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
8.14.3 remove
AAA User Database - User Context
Use remove to remove a RADIUS User from the system.
Syntax
remove <user_name> [CR]
Parameters
Example
WS5000.(Cfg).AAA.userdb.User> remove new
Removing User...
Status: Success.
Warning: Please commit these changes using Save command in AAA context.
8.14.4 remuser
AAA User Database - User Context
Use remuser to remove a user from a group
Syntax
remuser <user> <group>
8-116 WS 5000 Series System Reference
Parameters
Example
WS5000.(Cfg).AAA.userdb.User> remuser abc ws5k
Configuring Userdb...
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
8.14.5 set
AAA User Database - User Context
Use set to set password for an existing user.
Syntax
set passwd <username> [CR]
Parameters
Example
WS5000.(Cfg).AAA.userdb.User> set passwd abc
Enter New Password : ******
Re-Enter New Password : ******
Configuring Userdb...
Status : Success.
Warning: Please commit these changes using Save command in AAA context.
8.14.6 show
AAA User Database - User Context
Use show to display user database information.
Syntax
show users
show groups <userid>
Parameters
Example
WS5000.(Cfg).AAA.userdb.User> show users
CLI Command Reference 8-117
Available Users:
1.abc.
Note For brevity, converted Access Points are referred to as “Access Ports”
throughout this documentation.
Table 8.18 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.18 Access Port (APort) Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Creates a new Access Port instance, AP type specific. page 8-118
port Changes the context to the named Access Port instance, while displaying the page 8-119
Access Port’s details.
8.15.1 add
Access Port (APort) Context
Creates a new Access Port instance (or two, for dual-radio APs). The first argument is the AP type. The rest of
the arguments depend on the AP type.
Syntax
add AP100 <MAC> <name> [location]
add AP200 <MAC> <a_name> <a_MAC> [b_name] [b_MAC] [location]
add AP300 <MAC> <g_name> <g_MAC> [a_name] [a_MAC] [location]
add AP3020-3021 <MAC> <name> [location]
add AP4121 <MAC> <name> [location]
Parameters
a_MAC, b_MAC, g_MAC For dual-radio APs, you must supply the MAC of (at least) the AP’s “first” radio. The MAC
of the second radio is optional. The a_name, b_name, and g_name arguments refer to
the 802.11x radio types.
name, a_name, b_name, Unique names that you give to the Access Port and/or its radios. The a_name, b_name,
g_name and g_name arguments refer to the 802.11x radio types. For single-radio APs, you only
need to supply one name. For dual-radio APs, the name for the second radio is optional.
location Optional, arbitrary string that identifies the Access Port’s location.
Example
WS5000.(Cfg).APort> add AP100 00:10:5b:63:36:81 a_name BC
WS5000.(Cfg).APort.[a_name]>
8.15.2 port
Access Port (APort) Context
Changes the context to the named Access Port instance, while displaying the Access Port’s details.
8-120 WS 5000 Series System Reference
Syntax
port <APort_name>
Parameters
APort_name Selects the Access Port instance by name. Until you give an Access Port a name, it’s
known by the space-separated concatenation of its device MAC address and its 802.11
type (A or B), all enclosed in quotes: "xx:xx:xx:xx:xx:xx [A | B]"
For example: "00:A0:B0:C0:D0:E0 [A]"
Example
WS5000.(Cfg).APort> port a_name
WS5000.(Cfg).APort.[a_name]>
8.15.3 remove
Access Port (APort) Context
Removes the named Access Port. For a list of Access Port names, invoke the show command.
CLI Command Reference 8-121
Syntax
remove <port_name>
Parameters
Example
WS5000.(Cfg).APort> remove "00:a0:f8:11:12:14 [B]"
8.15.4 show
Access Port (APort) Context
Shows the Access Port configuration values.
Syntax
show
show interfaces
show channelInfo
Parameters
interfaces Display a list of Access Port instances and lists the available Ethernet ports.
channelInfo Display a list of country codes and the channels each country supports.
Example
WS5000.(Cfg).APort> show
WS5000.(Cfg).APort.[00:A0:F8:CF:20:1B [G]]> ..
WS5000.(Cfg).APort>
WS5000.(Cfg).APort>
WS5000.(Cfg).APort> show channelinfo
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
description Create a description for thr Access Port instance. page 8-123
8.16.1 description
Access Port Instance
Create a description for the Access Port instance.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg).APort.[ap_name]> description “This is a generic AP”
8.16.2 name
Access Port Instance
Set the Access Port name.
8-124 WS 5000 Series System Reference
Syntax
name <AP_name>
Parameters
Example
WS5000.(Cfg).APort.[ap_name]> name New_AP_name
WS5000.(Cfg).APort.[New_AP_name]>
8.16.3 reset
Access Port Instance
Resets the Access Port or its radio, depending on the parameter value.
Syntax
reset <reset_flag>
Parameters
reset_flag Indicates whether to reset the access port or radio. Valid options are:
• ap – Resets the Access Port that contains this radio that’s represented by this
instance. radio
• radio – Resets the radio that’s represented by this instance.
Example
WS5000.(Cfg).APort.[ap_name]> reset radio
WS5000.(Cfg).APort.[ap_name]> reset ap
8.16.4 set
Access Port Instance
The set command includes a group of different configuration commands to “set” or change Access Port device
parameters. The set of parameters that can be set or changed depends on the AP model, as shown inTable
8.20.
Table 8.20 Access Port Instance “Set” Command Summary
Set Command Description AP Models Syntax
name Set the Access Port name. All set name <ap_name>
policy Access Port policy thats applied to this Access All set policy <policy_name>
Port. See Access Port Policy (APPolicy) Context
on page 8-136.
CLI Command Reference 8-125
channel Access Port transmit channel. Possible values All except: set channel <value>
are: • AP 3020
• <channel#> – Specific channel number • AP 3021
• auto-once – The AP uses Automatic Channel
Selection (ACS) the first time it’s adopted by
the switch, and then sticks to that channel
thereafter.
• auto-always – The AP uses ACS every time
it’s adopted.
• random – The AP chooses a random channel
every time it's adopted.
power Access Port transmission power. Possible All except: set power <power_value>
values are 4-20 dBm • AP 3020
• AP 3021
muPower The amount in which associated mobile units All except: set muPower <mupwr_value>
are told to adjust (increase) their power. • AP 3020
Although this is a drain on MU batteries, it can • AP 3021
help improve signal fidelity. The possible
adjustment values are in positive, integral dB.
ccaMode Sets the Access Port’s CCA mode. Possible All set ccaMode <CCA_mode#>
values are:
• 0–
• 1 – Energy above threshold
• 2 – Carrier sense only
• 3 – Carrier sense with energy above
threshold
ccaThreshold Sets the Clear Channel Assessment threshold, All set ccaThreshold <value>
which is the maximum level of traffic that the
AP will accept and still consider the channel to
be clear. 0 means no traffic; 31 means jam-
packed.
diversity Access port diversity antenna setting. Possible All set diversity <setting>
values are:
• full – The AP dynamically chooses the
antenna with the strongest signal.
• primary – Use this AP as a Primary antenna.
• secondary – Use this AP as a Secondary
antenna.
vLanId VLAN ID that the Access Port is to be part of. All set vLanId <vLAN_ID>
antCorrection The power correction (increase) due to the AP’s AP 300 set antCorrection <value>
(isotropic) antenna; in dB (dBi).
indoor Indicates whether the AP is being used indoors AP 300 set indoors <true_or_false>
(true) or outdoors (false).
simulateRadar Tells the Access Port to pretend that radar has AP 300 set simmulateRadar
been discovered.
user-802.1x Declares a username for the AP, for information AP 300 set user-802.1x <username>
only.
detectorap Scans for rougue APs in all the channels AP 3020 set detectorap
AP 3021
AP 100
onchannelscan Scans for rougue APs in its operating channel. AP 3020 set onchannelscan
AP 3021
AP 100
Syntax
set <attribute> <value>
Parameters
See the applicable set command in Table 8.20 for more details, as applicable.
Example
When access port device attributes are set, all access port settings for the access port instance are displayed,
with the change in place. For example, in the following, the CCA Threshold value was changed from 0 to 10.
See the Syntax examples in Table 8.20 for details on each set command.
WS5000.(Cfg).APort.[00:A0:F8:A2:91:7C [B]]> set ccathreshold 10
CLI Command Reference 8-127
WS5000.(Cfg).APort.[00:A0:F8:A2:91:7C [B]]>
8.16.5 show
Access Port Instance
Display the configured details for the specified Access Port instance.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).APort.[00:A0:F8:A2:91:7C [B]]> show
Current Tx Channel : 6
Policy Attached : appol1
Tx Power : 20 dBm1
Current Tx Power : 20 dBm
Location :
NIC Connected : Ethernet 1
VLAN id : None
VLAN Tags seen : None
CCA Mode : 1
CCA Threshold : 10
Diversity : Full
No. of MUs associated : 1
Up Time : 6d:20h:36m
Statistics gathering : Disable
Tx Packets/second : 0
Antenna : unknown
Indoor/Outdoor : in
Antenna Correction : 0
MU Power Adjustment : 0
All Channels : 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11,
Valid Power Range : 4-20
DetectorAP : disable
On Channel Scan : enable
WS5000.(Cfg).APort.[00:A0:F8:A2:91:7C [B]]
CLI Command Reference 8-129
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Adds a new ACL (and changes to that instance context). page 8-130
show Display all defined ACLs within the switch. page 8-131
8.17.1 acl
Access Control List (ACL) Context
Display the ACL, including device MAC addresses, associated allow or deny rule, as well as the default ACL
action for the ACL if no rule is assigned to a particular device.
Syntax
acl <ACLname>
Parameters
Example
WS5000.(Cfg).ACL> acl "New ACL"
8-130 WS 5000 Series System Reference
WS5000.(Cfg).ACL.[New ACL]>
8.17.2 add
Access Control List (ACL) Context
Adds a new ACL and then changes the context to the named ACL instance context.
Syntax
add <ACLname>
Parameters
Example
WS5000.(Cfg).ACL> add 2-10ACL
Adding ACL...
Status: Success.
Available ACLs:
1. newacl.
2. 2-10ACL.
WS5000.(Cfg).ACL.[2-10ACL]>
8.17.3 remove
Access Control List (ACL) Context
Removes the named ACL.
Syntax
remove <ACLname>
Parameters
Example
WS5000.(Cfg).ACL> remove newacl
Removing ACL...
CLI Command Reference 8-131
Status: Success.
Available ACLs:
1. 2-10ACL.
WS5000.(Cfg).ACL>
8.17.4 show
Access Control List (ACL) Context
Display all defined ACLs within the switch.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).ACL> show
Available ACLs:
1. 2-10ACL.
WS5000.(Cfg).ACL>
8-132 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
set Configures settings for a particular ACL. Includes set name, set addItem, set page 8-132
remItem, set editItem, and set defaultAction.
show Display the ACL device lists and default settings. page 8-135
8.18.1 name
ACL Instance Context
Rename an ACL. Similar command to the set name command.
Syntax
name <new_name>
Parameters
Example
WS5000.(Cfg).ACL.[2-10ACL]> name archive_ACL
Configuring name...
Status : Success.
WS5000.(Cfg).ACL.[archive_ACL]>
8.18.2 set
ACL Instance Context
Configures settings for a particular ACL.
CLI Command Reference 8-133
See set name, set addItem, set remItem, set editItem, and set defaultAction for more details.
Syntax
set <set_operation> [applicable_parameters]
Parameters
Example
WS5000.(Cfg).ACL.[archive_ACL]> set name oldACL
WS5000.(Cfg).ACL.[oldACL]>
Example
WS5000.(Cfg).ACL.[testacl]> set addItem 00:a0:f8:01:02:03 allow
Configuring Access Control List...
Status: Success.
ACL Name : testacl
Default action on ACL items : allow
MAC address (range) Rule
------------------- ----
00:A0:F8:01:02:03 allow
8-134 WS 5000 Series System Reference
MAC_Address The MAC address of the device(s) to be removed. If the MAC address identifies the
beginning of an device range, the entire range is removed from the ACL.
Example
WS5000.(Cfg).ACL.[testacl]> set remItem 00:a0:f8:01:02:03
Parameters
oldStartMac Redefines an existing ACL entry. You can switch between allow and deny, or reset
newStartMac the address range. You can’t do both at the same time.
<allow | deny> |
newEndMAC>
Example
WS5000.(Cfg).ACL.[testacl]> set edititem 00:a0:f8:01:02:03 00:a0:f8:00:01:00 all
ow
Parameters
allow | deny Indicates a default adoption action for devices that are not associated with any ACL. If
allow is set, the device is associated with this ACL. If not, the device remains
unassociated.
Example
WS5000.(Cfg).ACL.[oldACL]> set defaultAction allow
WS5000.(Cfg).ACL.[oldACL]>
8.18.3 show
ACL Instance Context
Display the ACL device lists and default settings.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).ACL.[oldACL]> show
ACL Name : oldACL
Default action on ACL items : allow
WS5000.(Cfg).ACL.[oldACL]>
8-136 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Creates and names a new Access Port policy instance. page 8-136
policy Changes the context to a specific Access Port policy instance. page 8-137
show Shows details about the Access Port policy. page 8-138
8.19.1 add
Access Port Policy (APPolicy) Context
Creates and names a new Access Port policy instance.
Syntax
add <name>
Parameters
Example
WS5000.(Cfg).APPolicy> add newpolicy
WS5000.(Cfg).APPolicy.[newpolicy]>
8.19.2 policy
Access Port Policy (APPolicy) Context
Changes the command prompt into the named Access Port policy instance.
Syntax
policy <name>
Parameters
Example
WS5000.(Cfg).APPolicy> policy appol1
Access Port Policy details for "appol1":
WS5000.(Cfg).APPolicy.[appol1]>
8.19.3 remove
Access Port Policy (APPolicy) Context
Removes the named Access Port policy.
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).APPolicy> remove newpolicy
WS5000.(Cfg).APPolicy>
8.19.4 show
Show’s details about the Access Port policy.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).APPolicy> show
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Adds an WLAN to the Access Port Policy instance. page 8-139
description Add a unique identifier or description to the policy instance. page 8-140
map The map command, depending on the specified AP hardware type, page 8-141
moves you into a WLAN-to-BSS/ESS mapping subcontext.
name Rename an access port policy instance. page 8-141
show Show details for the Access Port Policy instance. page 8-142
set Set various configurations for the access port policy instance. This includes: page 8-143
set basicRates, set beacon, set dTim, set nonSpectrumMgmt, set np, set
preamble, set rtsThreshold, and set supportedRates.
8.20.1 add
Access Port Policy Instance
Adds an Access Port Policy instance.
Syntax
add <policy_name>
Parameters
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy]> add WLAN_NE
Adding WLAN...
Status: Success.
8-140 WS 5000 Series System Reference
WS5000.(Cfg).APPolicy.[NY_APpolicy]>
8.20.2 description
Access Port Policy Instance
Configures a brief description for the Access Port Policy instance.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg).APPolicy.[myAPPolicy]> description 2-11-05
Adding description...
Status : Success.
WS5000.(Cfg).APPolicy.[myAPPolicy]>
CLI Command Reference 8-141
8.20.3 map
Access Port Policy Instance
The map command, depending on the specified AP hardware type, moves you into a WLAN-to-BSS/ESS
mapping subcontext.
Some explanation is necessary, as follows. There are six Access Port device/radio types: AP 100, AP 200a, AP
200b, AP 300(a/g), AP 302x, AP 4121, and AP 4131. These hardware types are grouped by the number of BSSs
and ESSs that they support. Each BSS/ESS combination is represented by a pre-defined Map subcontext (there
are four Maps). Upon invoking the map command and specifying the “AP hardware type” parameter, the
command prompt is automatically changed to the correct Map subcontext.
From within the Map subcontext, you can assign (or map) the WLAN(s) that will support the BSS/ESS
combination. See the Access Port Map Context section for more details.
Syntax
map <apType>
Parameters
apType Type of AP, which thus indicates the BSS/ESS Mapping. Possible values are:
• AP100 – 4 BSS to 4 ESS
• AP200a – 1 BSS to 16 ESS
• AP200b, AP300a, or AP4121 – 4 BSS to 16 ESS
• FH – 1 BSS to 1 ESS
a. The AP 300 802.11a radio uses the same mapping as the AP 300 802.11g.
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy]> map ap4121
4BSS-16BSS mapping (used for AP200 11b radio, AP300 and AP4121):
WLAN Name BSS Primary BW(%)
--------- --- ------- -----
WLAN_NE 1 * 5.00%
Total BandWidth: 5.00%
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]>
WS5000.(Cfg).APPolicy.[SF_APpolicy].Map.[4BSS-4ESS]>
8.20.4 name
Access Port Policy Instance
Rename an access port policy instance.
Syntax
name <appolicy_name>
8-142 WS 5000 Series System Reference
Parameters
Example
WS5000.(Cfg).APPolicy.[NY_appolicy]> name NY_APPolicy
Configuring name...
Status : Success.
WS5000.(Cfg).APPolicy.[NY_APPolicy]>
8.20.5 remove
Access Port Policy Instance
Remove an AP Policy instance.
Syntax
remove <APPolicy_name>
Parameters
Example
WS5000.(Cfg).APPolicy> remove "New Access Port Policy"
WS5000.(Cfg).APPolicy>
8.20.6 show
Access Port Policy Instance
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy]> show
Access Port Policy details for "NY_APpolicy":
WS5000.(Cfg).APPolicy.[NY_APpolicy]>
8.20.7 set
Access Port Policy Instance
Used to configure the Access Port Policy instance related parameters.
Syntax
set <config_parameter>
Parameters
set np Assigns the Network Policy that’s associated with the combination of this
Access Port Policy and WLAN.
set preamble Sets the length of the preamble (either short or long) that’s added to the
packets that are sent by Access Ports that adopt this policy
set rtsThreshold Sets the Request to Send (RTS) threshold.
set dTim Sets the Access Port’s DTIM interval as a multiple of the beacon interval. Valid
DTIM values are in the range [1, 20].
set beacon Sets the Access Port’s radio beacon interval, in milliseconds. Valid intervals are
in the range [20, 1000].
set basicRates Sets the basic frequency rates for a given 802.11 radio type
set supportedRates Sets the radio frequencies that are supported by the device.
set nonSpectrumMgmt Tells the Access Port to allow (true) or deny (false) association for mobile
devices that don’t have spectrum management capabilities.
set wmm Sets the wmn for the switch
8-144 WS 5000 Series System Reference
Example
WS5000.(Cfg).APPolicy.[NY_APPolicy]> set
Syntax: set <config_parameter>
config_parameter is a required parameter.
Valid commands:
set name
set np
set preamble
set rtsthreshold
set dtim
set beacon
set basicrates
set supportedrates
set nonspectrummgmt
set wmm
set wmeprofile
WS5000.(Cfg).APPolicy.[NY_APPolicy]>
rates A list of frequency values, in Mbps. The list of candidate frequencies depends on the
radio type. You can set multiple basic rates by passing a list of frequencies, e.g.: > set
B basicrates 1 2 11
Example
WS5000.(Cfg).APPolicy.[QIAPPolicy01]> set basicrates b 1,2,5.5,11
WS5000.(Cfg).APPolicy.[QIAPPolicy01]>
beacon_interval Place holder to assign a becon interval period for the access port.
Example
WS5000.(Cfg).APPolicy.[QIAPPolicy01]> set beacon 150
Configuring a Access Port Policy...
Status: Success.
Access Port Policy details for "QIAPPolicy01":
WS5000.(Cfg).APPolicy.[QIAPPolicy01]>
Syntax
set dtim <dtim_period : 1 - 20>
set dtim <bss1 | bss2 | bss3 | bss4> <dtim_period : 1 - 20>
Parameters
bss Placeholder for selecting one of the four bss. AP which has only one bss use the value
for bss1.
Example
WS5000.(Cfg).APPolicy.[DtimTest5]> set dTim bss3 8
flag Indicates whether the AP will allow (true) or deny (false> association of mobile devices
that are not Spectrum-capable.
Example
WS5000.(Cfg).APPolicy.[NY_APPolicy]> set nonSpectrumMgmt true
CLI Command Reference 8-147
8.20.7.5 set np
Access Port Policy Instance
Assigns the Network Policy that’s associated with the combination of this Access Port Policy and WLAN.
Syntax
set np <np_name> <wlan_name>
Parameters
Example
WS5000.(Cfg).APPolicy.[testappolicy]> set np "Default Network Policy" WLAN10
threshold_value This is the maximum size of packets (in bytes) that use the four-way handshake, a
technique that allows nearby Access Ports to sense the wireless conversation and
improve throughput. The RTS threshold is set, by default, to 2347 (the largest packet
size). This effectively turns off the four-way handshake.
Possible values are 0 - 2347.
Example
WS5000.(Cfg).APPolicy.[NY_APPolicy]> set rtsthreshold 200
Description :
Basic Rate for 11a : 6,12,24
Supported Rate for 11a : 9,18,36,48,54
Basic Rate for 11b : 1,2
Supported Rate for 11b : 5.5,11
Basic Rate for 11g : 1,2,5.5,11
Supported Rate for 11g : 6,9,12,18,24,36,48,54
Basic Rate for FH : 1
Supported Rate for FH : 2
RF Preamble : short
RTS Threshold : 200 Bytes
DTIM Period : 10
DTIM Period BSS 2 : 10
DTIM Period BSS 3 : 10
DTIM Period BSS 4 : 10
Beacon Interval : 100
Allow MUs w/o Spectrum Mgmt : false
WME Enaled : Disabled
WME Profile Name : Default AP WME Profile
WS5000.(Cfg).APPolicy.[NY_APPolicy]>
Syntax
set supportedRates <radioType> <rates ...>
Parameters
radioType used to set any one of the valid radio types. The Valid Radio types are: A, B, G or FH.
rates Place holder to set the supported rates for corresponding selected radio. The support
rates for the different radio types are
A: 6, 9, 12, 18, 24, 36,48,54 and none
B: 1, 2, 5.5,11and none
G: 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 and none
FH: 1, 2 and none
Example
WS5000.(Cfg).APPolicy.[testappolicy]> set supportedrates a 36 54
Example
WS5000.(Cfg).APPolicy.[Default Access Port Policy]> set wmm enable
Table 8.26 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.26 Access Port Map Context Command Summary
Command Description BSS Map (AP Type) Ref.
.. or end Terminate a current session and moves up a context, All page 8-7
hierarchically.
exit Terminate a current session and returns to the “root” All page 8-7
prompt.
set bw Set the guaranteed bandwidth that is assigned to a 1BSS-to-16ESS page 8-152
WLAN. (AP200a)
4BSS-to-16ESS
(AP200b, AP300,
AP4121)
set primaryWLAN Set the primary WLAN for this map. 1BSS-to-16ESS page 8-153
(AP200a)
4BSS-to-16ESS
(AP200b, AP300,
AP4121)
8.21.1 select
Access Port Map Context
Assigns a WLAN to the map.
Syntax
select <wlan_name>
Parameters
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-4ESS]> select WLAN_NE
Success.
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-4ESS]>
8-152 WS 5000 Series System Reference
Note This command applies only to: 4BSS-to-16ESS (AP200b, AP300, AP4121)
Syntax
set bss <bss_index> <wlan_name>
Parameters
bssid The BSS index ID that is being assigned to the WLAN. Possible values are:
1 - 4.
wlan_name The name of the WLAN to take on the BSS index assignment.
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]> set bss 1 WLAN_NE
4BSS-16BSS mapping (used for AP200 11b radio, AP300 and AP4121):
WLAN Name BSS Primary BW(%)
--------- --- ------- -----
WLAN_NE 1 * 5.00%
Total BandWidth: 5.00%
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]>
8.21.3 set bw
Access Port Map Context
Sets the guaranteed bandwidth that’s assigned to a WLAN. The total bandwidth for all WLANs within a Map
must equal 100. This command applies only to: 1BSS-to-16ESS (AP200a), 4BSS-to-16ESS (AP200b, AP300,
AP4121)
Syntax
set bw <bandwidth> <wlan_name>
Parameters
bandwidth The percentage of bandwidth assigned to the WLAN. Valid percentages are in the range
from 5 to 100.
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]> set bw 20 WLAN_NE
Status: Success.
4BSS-16BSS mapping (used for AP200 11b radio, AP300 and AP4121):
WLAN Name BSS Primary BW(%)
--------- --- ------- -----
WLAN_NE 1 * 20.00%
Total BandWidth: 20.00%
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-16ESS]>
Syntax
set primaryWLAN <wlan_name>
Parameters
Example
WS5000.(Cfg).APPolicy.[QIAPPolicy01].Map.[4BSS-16ESS]> set primarywlan QIWLAN01
8.21.5 unselect
Access Port Map Context
Unassigns a WLAN to the map.
Note This command applies only to: 4BSS-to-4ESS (AP100), 1BSS-to-1ESS (AP302x)
Syntax
select <wlan_name>
Parameters
wlan_name The name of the WLAN to be unassigned from the BSSID assignment.
8-154 WS 5000 Series System Reference
Example
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-4ESS]> unselect WLAN_NE
Success.
WS5000.(Cfg).APPolicy.[NY_APpolicy].Map.[4BSS-4ESS]>
8.21.6 show
Access Port Map Context
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).APPolicy.[NY_APPolicy].Map.[4BSS-4ESS]> show
WS5000.(Cfg).APPolicy.[NY_APPolicy].Map.[4BSS-4ESS]>
CLI Command Reference 8-155
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.22.1 add
Classifier Context (CE)
Creates and names a Classifier instance, and changes the prompt to the instance’s context.
Syntax
add <ce_name>
Parameters
Example
WS5000.(Cfg).CE> add TestClassifier
Adding Classifier...
Status: Success.
Classifier information...
8-156 WS 5000 Series System Reference
Classifier information...
WS5000.(Cfg).CE.[TestClassifier]> ..
8.22.2 ce
Classifier Context (CE)
Changes the prompt to the context for the named Classifier instance.
Syntax
ce <ce_name>
Parameters
Example
WS5000.(Cfg).CE> ce 1
Classifier information...
8.22.3 remove
Classifier Context (CE)
Use remove to remove a classifier.
CLI Command Reference 8-157
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).CE> remove TestClassifier
Removing Classifier...
Status: Success.
Classifier information...
WS5000.(Cfg).CE>
8.22.4 show
Classifier Context (CE)
WS5000.(Cfg).CE> show
Shows Classifier details.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).CE> show
Classifier information...
WS5000.(Cfg).CE>
8-158 WS 5000 Series System Reference
Table 8.31 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.28 Classifier Instance Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.23.1 addMC
Classifier Instance
Adds a new matching criterion to the Classifier.
Syntax
addMC <parameters>
CLI Command Reference 8-159
Parameters
MACsource <MAC_address> The MAC address of the device that sent the packet. The value is a MAC
address in the usual form.
MACdestination <dest_MAC_address> The MAC address of the device to which the packet is being sent. The
value is a MAC address in the usual form.
ethertype <RFC1700 Ethernet type values> Ethernet type values, as defined by RFC 1700. Values are hex numbers in
the range [0 - FFFF].
vlanid <IDnumber> The ID of the VLAN to/from which the packet is being sent/has been
received. The value is a number.
userpriority <priority_value> Relative priority value. The value is a number in the range [0 - 7].
protocol <protocol_value> Ethernet protocol. The value is a (decimal) number in the range [0 - 254].
tos <tos_value> Type of Service identifier. The value is a number in the range [0 - 63].
IPsource <IPaddress> <subnet_mask> The IP address and subnet mask of the device from which the packet
emerged. The subnet mask is passed as a second argument
(subnet_mask). Both arguments are dot-separated IP addresses.
IPdestination <IPaddress> <subnet_mask> The IP address and subnet mask of the device to which the packet is
being sent. The subnet mask is passed as a second argument
(subnet_mask). Both arguments are dot-separated IP addresses.
sourceport <port#> [end_port#] The Ethernet port number, on the originating device, through which the
packet was sent. Optionally, a specific port can be declared (as a decimal
number), or a range of ports by supplying a second port number as the
end_port argument. Valid port numbers are in the range [0, 65535].
destinationport <port#> [end_port#] The Ethernet port number, on the recipient device, to which the packet is
being sent. Optionally, a specific port can be declared (as a decimal
number), or a range of ports by supplying a second port number as the
end_port argument. Valid port numbers are in the range [0, 65535].
MCMask <MAC_address> Multicast mask. The value is a MAC address that’s used to mask the
range of recipients of a broadcast packet.
Example
WS5000.(Cfg).CE.[HTTP_ce]> addmc IPsource 172.39.80.2 255.255.255.0
WS5000.(Cfg).CE.[HTTP_ce]>
8-160 WS 5000 Series System Reference
8.23.2 name
Classifier Instance
This CLI is used to change the name of the classifier.
Syntax
name <name>
Parameters
Example
WS5000.(Cfg).CE.[NewTraffic]> name "Ex HTTP Traffic"
Configuring name...
Status : Success.
8.23.3 description
This CLI is used to set the description for the policy or item selected in the context.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg).CE.[Ex Telnet Traffic]> description "This classifier is related to
Telnet Traffic"
Adding description...
Status : Success.
Classifier information...
8.23.4 removeMC
Classifier Instance
Removes the matching criterion for the named criteria.
Syntax
removeMC <parameters>
Parameters
See parameters described in addMC command on page 8-158.
Example
WS5000.(Cfg).CE.[HTTP_ce]> removemc IPsource
Classifier information...
WS5000.(Cfg).CE.[HTTP_ce]>
8.23.5 setMC
Classifier Instance
Sets the value of an existing matching criterion.
Syntax
setMC <paremeters>
Parameters
See parameters described in addMC command on page 8-158.
Example
WS5000.(Cfg).CE.[HTTP_ce]> setmc sourceport 7001 7010
2. 7001-7010.
WS5000.(Cfg).CE.[HTTP_ce]>
8.23.6 show
Classifier Instance
Shows details for this Classifier instance.
Syntax
show
show mc
Parameters
None.
Example
WS5000.(Cfg).CE.[Name]> show
Classifier information...
WS5000.(Cfg).CE.[HTTP_ce]>
CLI Command Reference 8-163
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Creates and names a new Classification Group instance. page 8-163
cg Changes the prompt to the context to a specified Classification Group page 8-164
instance.
8.24.1 add
Classification Group (CG) Context
Creates and names a new Classification Group instance, and changes the prompt to the instance’s context.
Syntax
add <cg_name>
Parameters
Example
WS5000.(Cfg).CG> add voip_in_cg
WS5000.(Cfg).CG.[voip_in_cg]>
8.24.2 cg
Classification Group (CG) Context
Changes the prompt to the context for a Classification Group instance.
Syntax
cg <cg_name>
Parameters
Example
WS5000.(Cfg).CG> cg voip_in_cg
Classification Group information...
Classification Group Name : voip_in_cg
CG Description :
No of classifiers for this CG : 1
WS5000.(Cfg).CG.[voip_in_cg]>
8.24.3 remove
Classification Group (CG) Context
Removes a Classification Group instance.
Syntax
remove <cg_name>
Parameters
Example
WS5000.(Cfg).CG> remove "New Classification Group"
WS5000.(Cfg).CG>
8.24.4 show
Classification Group (CG) Context
Display information about a system component or named context instance.
Syntax
show
show ce
Parameters
None.
Example
WS5000.(Cfg).CG> show
Classification Group information...
WS5000.(Cfg).CG>
8-166 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
description Add a text string to describe the Classification Group in more detail. page 8-166
set Set configuration parameters regarding the specific Classification Group page 8-167
Instance. Parameters such as name, adding and removing classifiers, and
setting actions
8.25.1 description
Classification Group Instance
Configures a brief description for the Classification Group instance.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg).CG.[anotherName]> description "This is a VOIP Group"
Adding description...
Status : Success.
WS5000.(Cfg).CG.[anotherName]>
CLI Command Reference 8-167
8.25.2 name
Classification Group Instance
Rename a Classification Group Instance.
Syntax
name <new_name>
Parameters
new_name New Name that the current Classification Group will be renamed.
Example
WS5000.(Cfg).CG.[new_CG]> name anotherName
Configuring name...
Status : Success.
WS5000.(Cfg).CG.[anotherName]>
8.25.3 set
Classification Group Instance
Performs an operation on the Classification Group instance.
Syntax
set <attribute> <value>
Parameters
attribute Description
name <cg_name> Sets the name of the Classification Group. Same as name command.
removeCE <ce_name> Removes the named Classifier instance from the CG.
action Associates an action with a Classifier (ce_name) that has been added to the CG.
Possible values are:
• allow <ce_name> – If this is set, packets that pass the Classifier are allowed to
continue and they’re marked as being part of this Classification Group instance (this
will be important when we bump up a level to Input and Output Policies). Packets that
don’t pass the evaluation are not immediately thrown away—they’re allowed or
denied according to the default action defined in the Input or Output Policy that uses
this CG.
• deny <ce_name> – Packets that pass the Classifier are thrown away. Packets that
don’t pass are allowed to continue (again, with no CG marking).
Example
WS5000.(Cfg).CG.[voip_in_cg]> set name VoIP_in_CG
WS5000.(Cfg).CG.[VoIP_in_CG]>
8-168 WS 5000 Series System Reference
WS5000.(Cfg).CG.[voip_in_cg]> show ce
Classifier information...
WS5000.(Cfg).CG.[voip_in_cg]>
WS5000.(Cfg).CG.[voip_in_cg]>
WS5000.(Cfg).CG.[voip_in_cg]>
8.25.4 show
Classification Group Instance
Display information about this Classification Group instance.
CLI Command Reference 8-169
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).CG.[CG_name]> show
Classification Group information...
Classification Group Name : anotherName
CG Description : This is a VOIP Group
No of classifiers for this CG : 0
WS5000.(Cfg).CG.[CG_name]>
8-170 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
set notify Tells the switch to send a notification if the temperature of the CPU or of the page 8-170
system, in general, rises above a given threshold.
Syntax
set notify <cpu-temperature | system-temperature> <threshold>
Parameters
threshold The temperature threshold is expressed in degrees centigrade and must fall in the range
[0, 105]. The notification is only sent when the temperature rises from below to above
the threshold temperature—it isn’t sent when the temperature drops from above to
below the threshold.
Example
WS5000.(Cfg).Chassis> set notify system-temperature 30
CPU Temperature 42 C 48 C 40 C 0 C
System Temperature 38 C 40 C 36 C 30 C
System Fan (rpm) 8437 8653 8437 None
CPU Fan (rpm) 23275 675000 5000 None
System Fan 2 OFF - - None
System Fan 3 OFF - - None
System Fan 4 15340 15340 15000 None
WS5000.(Cfg).Chassis>
8.26.2 show
Chassis Context
Display a table of temperature and fan speed statistics.
Under normal circumstances, both the system and the CPU should hover around 36 degrees. The Max Value
and Min Value readings are the maximum and minimum temperatures since the switch was last booted.
Currently, you cannot install a notification for fan speed.
Syntax
WS5000.(Cfg).Chassis> show
Parameters
None.
Example
WS5000.(Cfg).Chassis> show
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.27.1 port
Ethernet Port Context
Changes the context to an Ethernet port instance.
Syntax
port <port_number>
Parameters
Example
WS5000.(Cfg).Ethernet> port 1
Name : Ethernet 1
Network Interface Card # : 1
Description : Ethernet Adapter
MAC Address : 00:A0:F8:65:94:B8
Status : Enable
Online : Yes
Configured Mode : auto
Negotiated Mode - Duplex : Full
Negotiated Mode - Speed : 100
DHCP status : Disable
IP Address : 10.1.1.101
CLI Command Reference 8-173
WS5000.(Cfg).Ethernet.[1]>
8.27.2 show
Ethernet Port Context
Display Ethernet port details.
Syntax
show
show interfaces
Parameters
interfaces Shows adopted Access Port info and lists the switch’s Ethernet ports
Example
WS5000.(Cfg).Ethernet> show
WS5000.(Cfg).Ethernet>
8-174 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
description Set description text about the Ethernet port instance. page 8-15
ipAddress Configure an IP address for the Ethernet port. page 8-174
show Display details about the Ethernet Port instance. page 8-177
8.28.1 ipAddress
Ethernet Port Instance
Assigns an IP address to this Ethernet port instance.
Syntax
ipAddress <IP_address> <net_mask>
ipaddress dhcp <enable_flag>
Parameters
IP_address The IP address assigned to the Ethernet port if DHCP is disabled. Otherwise, use the
“ipaddress dhcp” command.
net_mask The network mask assigned to the Ethernet port if DHCP is disabled. Otherwise, use the
“ipaddress dhcp” command.
enable_flag When the ipaddress dhcp command is used, this flag indicates that the Ehernet port’s IP
address should be assigned by DHCP. Possible value is “enable” only, because
otherwise DHCP is disabled by default.
Example
WS5000.(Cfg).Ethernet.[1]> ipaddress 111.222.111.33 255.255.255.0
CLI Command Reference 8-175
WS5000.(Cfg).Ethernet.[1]>
ERROR: Cannot set parameter. DHCP can only be enabled on single interface at a
time.
WS5000.(Cfg).Ethernet.[1]>
8.28.2 set
Ethernet Port Instance
Sets an attribute of this Ethernet port instance.
Syntax
set <attribute> [<value>]
Parameters
attribute Description
dhcp Enables/disables the DHCP client for this port. Possible values are:
• enable
• disable
gateway Sets the IP address of the gateway. Enter the IP address as a value.
8-176 WS 5000 Series System Reference
attribute Description
vLanId Sets the primary VLAN ID. The port automatically becomes trunked.
Example
WS5000.(Cfg).Ethernet.[1]> set
port_parameter is a required parameter.
Syntax: set <port_parameter> <value>
Valid commands:
set dhcp
set domain
set vlanid
set gateway
set dns
set trunk
set nontrunk
set clearvlantags
set cfgmode
WS5000.(Cfg).Ethernet.[1]>
Name : Ethernet 1
Network Interface Card # : 1
Description : Ethernet Adapter
MAC Address : 00:A0:F8:65:94:B8
Status : Enable
Online : Yes
Configured Mode : auto
Negotiated Mode - Duplex : Full
Negotiated Mode - Speed : 100
DHCP status : Disable
IP Address : 10.1.1.101
Network Mask : 255.255.255.0
Domain Name : domain1
Port type (trunk/non-trunk) : Trunk Port
Primary VLAN id : 5
VLAN Tags seen : None
Up-Time : 12d:04h:05m
Transmit packets : 4262798
Received packets : 4961764
Gateway : 111.222.111.254
DNS servers :
1. 111.222.111.100.
WS5000.(Cfg).Ethernet.[1]>
CLI Command Reference 8-177
8.28.3 show
Ethernet Port Instance
Display Ethernet Port instance information.
Syntax
show
show interfaces
Parameters
interfaces Shows adopted Access Port info and lists the switch’s Ethernet ports
Example
WS5000.(Cfg).Ethernet.[1]> show
Name : Ethernet 1
Network Interface Card # : 1
Description : Ethernet Adapter
MAC Address : 00:A0:F8:65:94:B8
Status : Enable
Online : Yes
Configured Mode : auto
Negotiated Mode - Duplex : Full
Negotiated Mode - Speed : 100
DHCP status : Disable
IP Address : 10.1.1.101
Network Mask : 255.255.255.0
Domain Name : domain1
Port type (trunk/non-trunk) : Trunk Port
Primary VLAN id : 5
VLAN Tags seen : None
Up-Time : 12d:04h:07m
Transmit packets : 4263145
Received packets : 4962140
Gateway : 111.222.111.254
DNS servers :
1. 111.222.111.100.
WS5000.(Cfg).Ethernet.[1]>
8-178 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.29.1 add
Ethernet Policy (EtherPolicy) Context
Creates and names an Ethernet Policy instance, and changes the prompt to the new instance’s context.
Syntax
add <name>
Parameters
Example
WS5000.(Cfg).EtherPolicy> add LabEtherPolicy
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]>
8.29.2 policy
Ethernet Policy (EtherPolicy) Context
Changes the prompt to the context of the named Ethernet policy instance.
Syntax
policy <name>
Parameters
Example
WS5000.(Cfg).EtherPolicy> policy LabEtherPolicy
Ether Policy Name : LabEtherPolicy
Description :
Rest of Network on : Ethernet 2
VLANs mapped are:
LAN2 --> Ethernet: 2
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]>
8.29.3 remove
Ethernet Policy (EtherPolicy) Context
Removes an Ethernet Policy instance.
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).EtherPolicy> remove "New Ethernet Port Policy"
Removing EtherPolicy...
Status : Success.
WS5000.(Cfg).EtherPolicy>
8.29.4 show
Ethernet Policy (EtherPolicy) Context
Display Ethernet Policy information.
8-180 WS 5000 Series System Reference
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).EtherPolicy> show
WS5000.(Cfg).EtherPolicy>
CLI Command Reference 8-181
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Create and adds a VLAN to this ethernet policy instance. page 8-181
add tunnel Create and add an existing GRE Tunnel to this ethernet policy instance. page 8-182
remove Remove a VLAN from this ethernet policy instance. page 8-182
remove tunnel Remove the GRE tunnel from this ethernet policy instance. page 8-183
show Display details about the ethernet policy instance. page 8-184
8.30.1 add
Ethernet Policy Instance
Creates and adds a VLAN to this Ethernet Policy instance.
Syntax
add <vlan_ID> <NIC>
Parameters
vlan_ID The number that’s assigned to this VLAN. Valid VLAN ID numbers are in the range [1-4095].
Example
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> add 200 1
8-182 WS 5000 Series System Reference
Adding VLAN...
Status : Success.
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy].Vlan.[200]>
Parameters
Example
WS5000.(Cfg).EtherPolicy.[tunnelEP]> addtunnel tunnel4
Adding Tunnel...
Status : Success.
WS5000.(Cfg).EtherPolicy.[tunnelEP].Tunnel.[tunnel4]>
8.30.3 remove
Ethernet Policy Instance
Removes a VLAN from this Ethernet Policy instance.
CLI Command Reference 8-183
Syntax
remove <vlan_id>
Parameters
vlan_id The ID number of the VLAN that’s to be removed. For a list of VLAN IDs, invoke
show vlan.
Example
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> remove LAN2
Ether Policy Name : LabEtherPolicy
Description :
Rest of Network on : Ethernet 2
VLANs mapped are:
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]>
Parameters
tunnel_name Place holders for one of the existing GRE tunnels that you want to remove from the etherpolicy.
Example
WS5000.(Cfg).EtherPolicy.[tunnelEP]> removetunnel tunnel4
Removing Tunnel...
Status : Success.
WS5000.(Cfg).EtherPolicy.[tunnelEP]>
8.30.5 set
Ethernet Policy Instance
Configure attributes of the Ethernet Policy instance.
Syntax
set <attribute> <value>
8-184 WS 5000 Series System Reference
Parameters
attribute Description
ronnic <Ethernet_Port#> Sets the “rest of the network” NIC. This is the NIC that connects the switch to the wired
network. Possible values are:
• 1 – Ethernet port 1
• 2 – Ethernet port 2
Example
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> show
Ether Policy Name : LabEtherPolicy
Description :
Rest of Network on : Ethernet 2
VLANs mapped are:
LAN2 --> Ethernet: 2
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]>
8.30.6 show
Ethernet Policy Instance
Display Ethernet Policy details.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> show
Ether Policy Name : LabEtherPolicy
Description :
Rest of Network on : Ethernet 2
VLANs mapped are:
LAN2 --> Ethernet: 2
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]>
CLI Command Reference 8-185
8.30.7 tunnel
Use this to configure a tunnel.
Syntax
tunnel <tunnel_name>
Parameters
tunnel_name Place holders for one of the existing GRE tunnels that you want to configure.
Example
WS5000.(Cfg).EtherPolicy.[tunnelEP]> tunnel tunnel3
WS5000.(Cfg).EtherPolicy.[tunnelEP].Tunnel.[tunnel3]>
8.30.8 vlan
Ethernet Policy Instance
Changes the prompt to the context of the VLAN identified by VLAN ID.
Syntax
vlan <vlan_ID>
Parameters
vlan_ID The ID of the VLAN. For a list of VLAN IDs, invoke show vlan.
Example
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy]> vlan 200
Adding VLAN...
Status : Success.
WS5000.(Cfg).EtherPolicy.[LabEtherPolicy].Vlan.[200]>
8-186 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
set Configuration option to configure notifications and severities for page 8-186
events sent to the Syslog.
syslog Changes the prompt to the Syslog context. page 8-187
show Display available system events, and notification settings for various page 8-187
system logs.
8.31.1 set
Event Context
Provides event notification and event severity configurations for events sent to the Syslog.
Syntax
set <event> <target> <<enable | severity> | disable>
set all <localLog | snmpTrap | syslog> <<enable | severity> | disable>
set all default
Parameters
event Describes the event that you’re interested in. Either all or a number in the range [1,
69]. Use the show command for a list of available events.
target The recipient of the events. One of localLog, snmpTrap, syslog, or all.
enable, disable Enables and disables recording of the event. If your target is syslog, then you can
pass a severity value rather than simply enable’ing the event.
severity Events that are sent to the Syslog are tagged with a severity, one of emerg(ency),
alert, crit(ical), err(or), info, notice, and warning. If you enable an event
without a severity, it assumes a default severity setting.
all <localLog | snmpTrap | The first set all form of the command lets you send or repress all events to/from the
syslog> specified target.
CLI Command Reference 8-187
all default This form of the command resets all events to their factory defaults.
8.31.2 syslog
Event Context
Changes the prompt to the Syslog Context. See page 8-189 for more details.
8.31.3 show
Event Context
Display available system events, and notification settings in terms of the following logging:
• Local log – Events are recorded in a local log file. You can dump the log file to the screen through show
sysAlerts in the System or Configuration context.
• SNMP Traps – You can ask to have an SNMP trap thrown when a specific event occurs.
• Syslog – The Syslog is a remote event-recording server. You have to set up the server yourself and
identify the server’s host.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg)> show
WS5000.(Cfg).Event>
CLI Command Reference 8-189
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
logsubsys Selects the subsystem to be sent to the remote syslog server page 8-191
purgelocal Purge the local syslog contents from memory page 8-192
8.32.1 add
Syslog Context
Add a new host to the system.
8-190 WS 5000 Series System Reference
Syntax
add <host_name> <IP_address> [domain]
Parameters
Example
WS5000.(Cfg).Event.Syslog> add SFhost 111.222.111.32 domain1
Adding Host...
Status: Success.
WS5000.(Cfg).Event.Syslog>
8.32.2 local
Syslog Context
Stores the debug logs locally and maintains a ring buffer of debug logs.
To save the logs to a file use the command:
save local <filename>
To view the logs use the command:
view local <filename>
To delete the logs to a file use the command:
remlocal <filename>
Syntax
local <enable | disable>
Parameters
Example
WS5000.(Cfg).Event.Syslog> local enable
Local Syslog enabled
WS5000.(Cfg).Event.Syslog>
8.32.3 logdir
Syslog Context
This command displays the contents of all directories (one directory each for each user) under /WS5000
Switch/Userlogs/ <the local log log file saved with a .syslog extension>
CLI Command Reference 8-191
Syntax
logdir
logdir <username>
Parameters
Example
WS5000.(Cfg).Event.Syslog> logdir
File Name Bytes Date & time
========================================================
SymbolLocal.syslog 34 Thu Feb 23 03:14:13 2006
WS5000.(Cfg).Event.Syslog>
8.32.4 logsubsys
Syslog Context
Selects the subsystem logs (used for debugging) to be sent to the remote syslog server. These logs are different
from Event logs.
Syntax
logsubsys [<subsys>] enable | disable
The following subsys are available for logsusbys:
logsubsys general
logsubsys threads
logsubsys packets
logsubsys corba
logsubsys sharedmem
logsubsys rfimage
logsubsys rfport
logsubsys mu
logsubsys ess
logsubsys xmlcfg
logsubsys policy
logsubsys vlan
logsubsys ether
logsubsys QoS
logsubsys stats
logsubsys database
logsubsys snmp
logsubsys security
logsubsys DebugEvents
8-192 WS 5000 Series System Reference
logsubsys driver
Parameters
Example
WS5000.(Cfg).Event.Syslog> logsubsys driver enable
WS5000.(Cfg).Event.Syslog>
8.32.5 ping
Syslog Context
Ping is used to send ICMP ECHO_REQUEST packets to network hosts.
Syntax
ping <host/ip_address>
Options:
ping [-Rdfnqrv] [-c count] [-i wait] [-l preload]
[-p pattern] [-s packetsize] host
Parameters
Example
WS5000.(Cfg)> ping 157.235.208.70
PING 157.235.208.70 (157.235.208.70) from 157.235.208.137 : 56(84) bytes of dat.
64 bytes from 157.235.208.70: icmp_seq=1 ttl=128 time=0.637 ms
64 bytes from 157.235.208.70: icmp_seq=2 ttl=128 time=0.318 ms
64 bytes from 157.235.208.70: icmp_seq=3 ttl=128 time=0.303 ms
64 bytes from 157.235.208.70: icmp_seq=4 ttl=128 time=0.296 ms
8.32.6 purgelocal
Syslog Context
This command is used to clears the local syslog memory.
CLI Command Reference 8-193
Syntax
purgelocal
Parameters
None
Example
WS5000.(Cfg).Event.Syslog> purgelocal
WS5000.(Cfg).Event.Syslog>
8.32.7 remlocal
Syslog Context
This command is used to delete the specified local syslog file. Use 'logdir' to view list of previously saved local
syslog files.
Syntax
remlocal <file_name>
Parameters
Example
WS5000.(Cfg).Event.Syslog> remlocal SymbolLocal
WS5000.(Cfg).Event.Syslog>
8.32.8 remove
Syslog Context
Remove a syslog host.
Syntax
remove <name>
Parameters
name The name of the syslog host, as assigned in the add command.
Example
WS5000.(Cfg).Host> show
WS5000.(Cfg).Host>
8-194 WS 5000 Series System Reference
Parameters
file_name the naame of the local log file without the .syslog extension.
Example
WS5000.(Cfg).Event.Syslog> save local SymbolLocal
WS5000.(Cfg).Event.Syslog>
8.32.10 set
Syslog Context
Set the types of messages that are sent to the syslog.
Syntax
set <host> <severity> <send_flag>
Parameters
severity Specifies a type of message tracked to be sent to the syslog. Possible values are:
• emerg – emergency messages
• alert
• crit – critical messages
• err – error messages
• info – information only messages
• notice
• warning
• all – all messages of all types
send_flag Indicates whether messages are sent to the syslog or not. Possible values are:
• enable – messages of the specified type are sent to the syslog
• disable – messages are not sent to the syslog
Example
WS5000.(Cfg).Event.Syslog> set
Enter the host_name
set:
Set syslog host severity level values.
severity_level:
CLI Command Reference 8-195
WS5000.(Cfg).Event.Syslog>
WS5000.(Cfg).Event.Syslog> set SFhost alert enable
WS5000.(Cfg).Event.Syslog>
8-196 WS 5000 Series System Reference
8.32.11 show
Syslog Context
Display information about the syslog service.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).Event.Syslog> show
WS5000.(Cfg).Event.Syslog>
WS5000.(Cfg).Event.Syslog> set SFhost all disable
Success.
WS5000.(Cfg).Event.Syslog> show
WS5000.(Cfg).Event.Syslog>
8.32.12 start
Syslog Context
Starts the syslog service.
Syntax
syslog
Parameters
None.
Example
WS5000.(Cfg).Event.Syslog> start
Status: Success.
WS5000.(Cfg).Event.Syslog>
8.32.13 stop
Syslog Context
Stops the syslog service.
Syntax
stop
Parameters
None.
Example
WS5000.(Cfg).Event.Syslog> stop
Status: Success.
WS5000.(Cfg).Event.Syslog>
8-198 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.33.1 enable
FTP Context
Enables the FTP server.
Syntax
enable
Parameters
None.
Example
WS5000.(Cfg).FTP> enable
Enabling...
Status : Success.
WS5000.(Cfg).FTP>
8.33.2 disable
FTP Context
Disables the FTP server.
Syntax
disable
Parameters
CLI Command Reference 8-199
None.
Example
WS5000.(Cfg).FTP> disable
Disabling...
Status : Success.
WS5000.(Cfg).FTP>
8.33.3 show
FTP Context
Display the state of the FTP server.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).FTP> show
WS5000.(Cfg).FTP>
8-200 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.34.1 add
FW (Firewall) Context
This command is used to add a new LAN to the system.
Syntax
add <lan_name>
Parameters
lan_name Name of the LAN that you wish too add to the system.
Example
WS5000.(Cfg).Fw> add testLAN
Adding LAN...
Status: Success.
LAN information:
Available LANs:
1. LAN1
CLI Command Reference 8-201
2. LAN2
3. LAN_VPN
4. testLAN
LAN information:
LAN details...
Name : testLAN
Description :
ep :
np :
allow : https http telnet ftp
deny :
NAT list:
WS5000.(Cfg).Fw.[testLAN]>
8.34.2 addnat
FW (Firewall) Context
This command is used to add a NAT (Network Address Translation) entry to a specific LAN/LAN+ VLAN
combination.
Syntax
addnat <"remoteRealIp,localNatIp"> <lan_name> [vlanid]
Parameters
localNatIp This is the IP address of the remote device as seen by the device accross the WS5000
switch.
lan_name The LAN in which this NAT entry should be added to. Could be one of LAN 1 or LAN 2 or
LAN_VPN.
Example
WS5000.(Cfg).Fw> addnat "1.2.3.4,10.2.3.4" LAN1
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
WS5000.(Cfg).Fw> 1
LAN information:
LAN details...
Name : LAN1
Description : Public LAN
ep : 1
np :
8-202 WS 5000 Series System Reference
1: 1.2.3.4,10.2.3.4
WS5000.(Cfg).Fw.[LAN1]>
8.34.3 addnp
FW (Firewall) Context
This command is used to add a new NP (network policy) to the system.
Syntax
addnp <lan_name> <NP> enter remove to delete the existing NP.
Parameters
lan_name The LAN in which this network policy should be added to. Could be one of LAN 1 or LAN
2 or LAN_VPN.
Example
WS5000.(Cfg)> np
WS5000.(Cfg).NP.[TestNP]>
WS5000.(Cfg)> fw
CLI Command Reference 8-203
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
WS5000.(Cfg).Fw> lan 2
LAN information:
LAN details...
Name : LAN2
Description : Private LAN
ep : 2
np : TestNP
allow : https http telnet ftp
deny :
NAT list:
WS5000.(Cfg).Fw.[LAN2]>
8.34.4 addpf
FW (Firewall) Context
This command is used to add a PF (port filter) to the system.
Syntax
addpf <lan_name> <allow/deny> <web/telnet/ftp>
Parameters
lan_name The LAN in which this port filter should be added to. Could be one of LAN 1 or LAN 2 or
LAN_VPN.
Example
WS5000.(Cfg).Fw> addpf LAN1 allow telnet
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
WS5000.(Cfg).Fw>
8.34.5 lan
FW (Firewall) Context
Use this command to select a LAN to configure.
Syntax
lan <lan_name>
Parameters
Example
WS5000.(Cfg).Fw> lan LAN1
LAN information:
LAN details...
Name : LAN1
Description : Public LAN
ep : 1
np :
allow : https http telnet ftp
deny :
NAT list:
1: 1.2.3.4,10.2.3.4
WS5000.(Cfg).Fw.[LAN1]>
8.34.6 remove
FW (Firewall) Context
This command is used to remove a LAN from the system.
Syntax
remove <lan_name>
Parameters
Example
WS5000.(Cfg).Fw> remove testLAN
Removing LAN...
Status: Success.
CLI Command Reference 8-205
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
4. lan
WS5000.(Cfg).Fw>
8.34.7 show
FW (Firewall) Context
This command is used to display the ACL information, security policy detials, LAN details and other context
specific attributes.
Syntax
show acl
show securitypolicy
show
show lan
Parameters
Example
WS5000.(Cfg).Fw> show acl
Available ACLs:
1. testACL.
WS5000.(Cfg).Fw>
WS5000.(Cfg).Fw>
LAN information:
Available LANs:
1. LAN1
2. LAN2
3. LAN_VPN
4. lan
8-206 WS 5000 Series System Reference
WS5000.(Cfg).Fw>
CLI Command Reference 8-207
8.35 FW Instance
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.35.1 set
FW Instance
This command is used to configure LAN parameters.
Syntax
set <config_parameter> <parameter_value>
Parameters
Example
WS5000.(Cfg).Fw.[LAN1]> set np "Default Network Policy"
Configuring a LAN...
Status: Success.
8-208 WS 5000 Series System Reference
LAN information:
LAN details...
Name : LAN1
Description : Public LAN
ep : 1
np : Default Network Policy
allow : https http telnet ftp
deny :
NAT list:
1: 1.2.3.4,10.2.3.4
WS5000.(Cfg).Fw.[LAN1]>
8.35.2 show
FW Instance
This command is used to display firewalls LAN information.
Syntax
show
Parameters
None
Example
WS5000.(Cfg).Fw.[LAN1]> show
LAN information:
LAN details...
Name : LAN1
Description : Public LAN
ep :
np : Default Network Policy
allow : https http telnet ftp
deny :
NAT list:
1: 1.2.3.4,10.2.3.4
WS5000.(Cfg).Fw.[LAN1]>
CLI Command Reference 8-209
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.36.1 add
Host Context
Adds a new host to the system.
Syntax
add host <name> <IP_address> [domain]
Parameters
Example
WS5000.(Cfg).Host> add NYhost 111.222.111.30 NYdomain
Adding Host...
Status: Success.
WS5000.(Cfg).Host.[NYhost]>
8-210 WS 5000 Series System Reference
8.36.2 host
Host Context
Changes the prompt to the context of a specified Host instance context.
Syntax
edit <host>
Parameters
Example
WS5000.(Cfg).Host> host NYhost
WS5000.(Cfg).Host.[NYhost]>
8.36.3 remove
Host Context
Removes a host from the host list.
Syntax
remove <host_name>
Parameters
Example
WS5000.(Cfg).Host> remove NYhost
WS5000.(Cfg).Host>
8.36.4 show
Host Context
Display host information.
Syntax
show
show host
show syslog
show system
CLI Command Reference 8-211
Parameters
Example
WS5000.(Cfg).Host> show host NYhost 111.222.111.30 NYdomain
WS5000.(Cfg).Host>
8-212 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.37.1 set
Host Instance
Configures a host.
Syntax
set <attribute> <value>
Parameters
domain The host’s domain name. The value of the domain should follow.
Example
WS5000.(Cfg).Host.[NYhost]> show
WS5000.(Cfg).Host.[NYhost]>
WS5000.(Cfg).Host.[NYhost]>
WS5000.(Cfg).Host.[NYhost]>
8.37.2 show
Host Instance
Shows host configuration details.
Syntax
show
show system
Parameters
None.
Example
WS5000.(Cfg).Host.[NYhost]> show host
WS5000.(Cfg).Host.[NYhost]>
WS5000.(Cfg).Host.[NYhost]>
8-214 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
dump Dumps the principals to the specified file (The file can be moved to another page 8-216
machine and the database is thus transferred)
synchronize Synchronize a Slave KDC DB with a Master KDC DB. page 8-221
8.38.1 add
KDC Context
Adds a Slave KDC to/from the Master KDC. This command can only be invoked if the switch is configured to
be the Master KDC.
Syntax
add mu <name> <ticket_life>
or
add slavekdc <name> <ip_address> <domain>
Parameters
Example
WS5000.(Cfg).KDC> add mu symbol 10
Enter password for the mu "symbol" : ******
Confirm password for mu "symbol" : ******
WS5000.(Cfg).KDC>
8.38.2 authenticate
KDC Context
Authenticates a slave KDC with its master. This is used when a KDC master has been deleted and re-created
afterwards. In this case, the slave has no way of knowing if a new master has been configured, therefore it
needs to be manually authenticated again.
Note When you try to exectue this command on a switch which has been confiured
as a Master KDC , the following message is displayed:
WS5000.(Cfg).KDC> authenticate
This command is available only for a SLAVE KDC.
The present KDC is configured as MASTER.
WS5000.(Cfg).KDC>
Syntax
authenticate
Parameters
None
Example
WS5000.(Cfg).KDC> authenticate
WS5000.(Cfg).KDC>
8-216 WS 5000 Series System Reference
8.38.3 dump
KDC Context
Writes the KDC database to a file.
Syntax
dump <filename>
Parameters
filename Name of the file to which the database is written. The “.krb” extension is
automatically appended.
Example
WS5000.(Cfg).KDC> dump kdcTracks
WS5000.(Cfg).KDC> ..
WS5000.(Cfg)> dir
Date & Time Bytes File Name
WS5000.(Cfg)>
8.38.4 remove
KDC Context
This command is used to remove to delete Slave-KDC or MU from the Master KDC or to delete NTP Servers.
Syntax
remove mu <name>
remove slavekdc <name> <ip_address> <domain>
remove ntpserver <ntp_index>
Parameters
Example
WS5000.(Cfg).KDC> remove mu symbol
CLI Command Reference 8-217
WS5000.(Cfg).KDC>
List of all active KDC users (MUs & WLANs): No active Users available.
WS5000.(Cfg).KDC>
WS5000.(Cfg).KDC>
8.38.5 set
KDC Context
Use set to configure or create the KDC in the system or configure KDC access type.
Syntax
set master <realm> <if_num>
set slave <realm> <masters_name> <masters_ip> <if_num>
set clear
set ntpserver <server_no> <server_ip>
set access <cli/snmp> <enable/disable>
Parameters
masters_ip Domain over which the KDC has dominion.Required is kdc_type is slave.
server_no Sets one of the three NTP servers for this switch.NTP server number, 1 to 3.
server_ip NTP server IP address.
access Permits or denies configuration of the on-board KDC through Telnet (CLI) or SNMP.
Example
WS5000.(Cfg).KDC>
WS5000.(Cfg).KDC>
WS5000.(Cfg).KDC>
CLI Command Reference 8-219
WS5000.(Cfg).KDC>
WS5000.(Cfg).KDC>
8.38.6 show
KDC Context
Shows KDC details.
Syntax
show
show configaccess
show kdc
show ntpservers
show users
Parameters
Example
WS5000.(Cfg).KDC> show
Interface : ethernet1
User count (Active + deleted) : 1
Active users (MUs and WLANs) : 1
WS5000.(Cfg).KDC>
WS5000.(Cfg).KDC>
List of all active KDC users (MUs & WLANs): No active Users available.
WS5000.(Cfg).KDC>
WS5000.(Cfg).KDC>
CLI Command Reference 8-221
WS5000.(Cfg).KDC>
8.38.7 synchronize
KDC Context
The krb database propagates from master to slave so that slave gets all the user information. It copies the
Master KDC database to the Slave KDC.
Syntax
synchronize <slave_name> <slave_ip> <slave_domain>
Parameters
Example
WS5000.(Cfg).KDC> synchronize standby 111.222.111.30 Symbol.com
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.39.1 add
Network Policy (NP) Context
Creates and adds a Network Policy instance.
Syntax
add <name>
Parameters
Example
WS5000.(Cfg).NP> add NY_ntwk_SwitchPolicy
WS5000.(Cfg).NP.[NY_ntwk_SwitchPolicy]>
8.39.2 np
Network Policy (NP) Context
Changes the prompt to the context of a specific Network Policy instance.
Syntax
np <name>
Parameters
Example
WS5000.(Cfg).NP> np NY_ntwk_SwitchPolicy
Network Policy information
Network Policy Name : NY_ntwk_SwitchPolicy
Policy Description :
Outbound Policy Object name :
Inbound Policy Object name :
WS5000.(Cfg).NP.[NY_ntwk_SwitchPolicy]>
8.39.3 remove
Network Policy (NP) Context
Removes a Network Policy instance.
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).NP> show
Network Policy information
WS5000.(Cfg).NP>
8.39.4 show
Network Policy (NP) Context
Shows Network Policy details.
Syntax
show Display context specific attributes
show ce Display Classifiers
show cg Display Classification Group
show np Display Network Policy information
show po Display Policy Object information
Parameters
None.
Example
WS5000.(Cfg).NP> show
Network Policy information
WS5000.(Cfg).NP>
CLI Command Reference 8-225
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.40.1 set
Network Policy Instance
Sets an attribute of this Network Policy instance.
Syntax
set <attribute> <value>
Parameters
name name Sets the name of the Network Policy. Enter the name after the “name” attribute.
inboundPolicy name | remove Adds the named Policy Object as the inbound policy. If the value is remove, the
policy is removed.
outboundPolicy name | remove Adds the named Policy Object as the outbound policy. If the value is remove, the
policy is removed.
Example
WS5000.(Cfg).NP.[NY_NetworkPolicy]> set
config_parameter is a required parameter.
set:
Use set to configure a Network Policy components.
where:
config_parameter Network Policy parameter to be cofigured.
parameter_value Value for the NP parameter.
Type 'remove' to remove a Policy Object
config_parameter:
name Change name of the Network Policy.
8-226 WS 5000 Series System Reference
WS5000.(Cfg).NP.[NY_NetworkPolicy]>
WS5000.(Cfg).NP.[NY_NetworkPolicy]> show po
Policy Object information......
8.40.2 show
Network Policy Instance
Syntax
show ce
show cg
show np
show po
show
Parameters
ce Display Classifiers
Example
WS5000.(Cfg).NP.[NY_NetworkPolicy]> show
Network Policy information
Network Policy Name : NY_NetworkPolicy
Policy Description : For NY switching
Outbound Policy Object name : New Output Policy
Inbound Policy Object name : New Input Policy
CLI Command Reference 8-227
WS5000.(Cfg).NP.[NY_NetworkPolicy]>
8-228 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.41.1 add
Policy Object (PO) Context
Creates and adds a Policy Object instance.
Syntax
add <name> <type>
Parameters
type The “direction” of the policy: Possible values are: 1 = outbound; 2 = inbound.
Example
WS5000.(Cfg).PO> add
po_name is a required parameter.
Syntax: add <po_name> <po_type> [CR]
WS5000.(Cfg).PO.[Inbound]>
8.41.2 po
Policy Object (PO) Context
Changes the prompt to the context of a specified Policy Object instance.
Syntax
po <name>
Parameters
Example
WS5000.(Cfg).PO> 1
Policy Object information......
8.41.3 remove
Policy Object (PO) Context
Removes a Policy Object instance.
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).PO> remove Inbound
WS5000.(Cfg).PO>
8.41.4 show
Policy Object (PO) Context
Shows Policy Object details.
Syntax
show
show ce
show cg
show np
show po
Parameters
ce Display Classifiers
Example
WS5000.(Cfg).PO> show
Policy Object information......
5. Inbound.
WS5000.(Cfg).PO>
8-232 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.42.1 set
Policy Object Instance
Sets an attribute of this Policy Object instance.
Syntax
set <attribute> <value>
Parameters
addCG Adds the named Classification Group to the Policy set addCG <cg_name>
Object.
defaultAction Sets the default action for this Policy Object. set defaultAction <allow_deny_flag>
name Sets the name of this Policy Object instance. set name <policy_object_name>
removeCG Removes the named Classification Group from the set removeCG <cg_name>
Policy Object.
IPredirect
CLI Command Reference 8-233
priority
tos Sets the ToS packet marking bits for packets set tos <bits> <cg_name>
marked with the named Classification Group. The
bits value is the packet marking/ToS given as a 6-bit
bit-field. For example: 101101.
Example
WS5000.(Cfg).PO.[Inbound]> set
config_parameter is a required parameter.
Syntax: set <config_parameter>
Valid commands:
set name
set addcg
set removecg
set cgpktmod
set defaultaction
set ipredirect
set priority
set tos
WS5000.(Cfg).PO.[Inbound]> show cg
Classification Group information...
WS5000.(Cfg)> po
Policy Object information......
WS5000.(Cfg).PO> 1
Policy Object information......
8-234 WS 5000 Series System Reference
8.42.2 show
Policy Object Instance
Show details about the Policy Object or related components.
Syntax
show
show ce
show cg
show np
show po
Parameters
ce Display Classifiers
Example
WS5000.(Cfg)> po
Policy Object information......
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.43.1 set
8.43.1.1 set authentication
Radius Context
Sets the type of connection for which logins must be authenticated by the Radius server.
Syntax
set authentication <connection>
Parameters
Example
WS5000.(Cfg).RADIUS> set authentication serial enable
WS5000.(Cfg).RADIUS>
host name | IP [port] [timeout] [retry] Identifies the Radius server by name or IP address. The other three
attributes can be set here, as well
retry 1 - 10 Specifies the number of times a Mobile Unit can try to authenticate
itself during the reauthentication phase. The default is 5 attempts.
timeout 30, 65535 Specifies the time interval, in seconds, after which Mobile Units are
forced to reauthenticate with the Radius server. Valid values are in the
range seconds; the default is 3600 seconds (1 hour).
Example
WS5000.(Cfg).RADIUS> set primary port 20
Syntax
set secondary <radius_parameter> <value>
set secondary host <host_name/IP> [port] [timeout] [retry]
set secondary port <port: 1-65535>
set secondary timeout <time: 5-20>
set secondary retry <retry: 1-10>
Parameters
host name | IP [port] [timeout] [retry] Identifies the Radius server by name or IP address. The other three
attributes can be set here, as well
retry 1 - 10 Specifies the number of times a Mobile Unit can try to authenticate
itself during the reauthentication phase. The default is 5 attempts.
timeout 30, 65535 Specifies the time interval, in seconds, after which Mobile Units are
forced to reauthenticate with the Radius server. Valid values are in the
range seconds; the default is 3600 seconds (1 hour).
Example
WS5000.(Cfg).RADIUS> set secondary retry 5
WS5000.(Cfg).RADIUS>
8.43.2 show
Radius Context
Display the WS5000’s Radius settings.
Syntax
show Display context specific attributes
show radius-server Display Radius information
Parameters
None.
Example
WS5000.(Cfg).Radius> show
WS5000.(Cfg).Radius>
WS5000.(Cfg).Radius> show radius-server
WS5000.(Cfg).Radius>
CLI Command Reference 8-239
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
set Set or Reset any or all of the detection mechanism page 8-241
8.44.1 approvedlist
Rogueap Context
Use approvedlist to view or configure Approved AP List for RogueAP detection.
Syntax
approvedlist
Parameters
None
Example
WS5000.(Cfg).rogueap> approvedlist
WS5000.(Cfg).rogueap.approvedlist>
8-240 WS 5000 Series System Reference
8.44.2 detectorap
Rogueap Context
Use detectorap to view or configure DetectorAP List for DetectorAP scan.
Syntax
detectorap
Parameters
None
Example
WS5000.(Cfg).rogueap.detectorap> add "00:A0:F8:BF:8A:6B [A]"
Adding DetectorAP...
Status: Success.
Available DetectorAPs:
----------------------
1 00:A0:F8:BF:8A:6B [A]
WS5000.(Cfg).rogueap.detectorap>
8.44.3 roguelist
Rogueap Context
Use roguelist to view or configure Approved AP List for RogueAP detection.
Syntax
roguelist
Parameters
None
Example
WS5000.(Cfg).rogueap> roguelist
WS5000.(Cfg).rogueap.roguelist>
8.44.4 rulelist
Rogueap Context
Use rulelist to configure Authorised AP List for RogueAP detection.
Syntax
rulelist
CLI Command Reference 8-241
Parameters
None
Example
WS5000.(Cfg).rogueap.rulelist> add 11:22:22:22:22:22 test
Adding AuthAP...
Status: Success.
WS5000.(Cfg).rogueap.rulelist>
8.44.5 set
Rogueap Context
Use set to set or reset any or all of the detection mechanism.
Syntax
set <feature_name> <enable/disable> [<interval>]
Parameters
Example
WS5000.(Cfg).rogueap> set rogueap enable
Configuring RogueAP...
Status: Success.
WS5000.(Cfg).rogueap>
or
Configuring APScan...
Status: Success.
WS5000.(Cfg).rogueap>
8.44.6 show
Rogueap Context
Lists the available RogueAP instances.
Syntax
show [display_parameter]
Parameters
Example
WS5000.(Cfg).rogueap> show rogueap
WS5000.(Cfg).rogueap>
CLI Command Reference 8-243
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
add Creates and adds a new Security Policy Instance. page 8-243
policy Changes the prompt to the context of the named Security Policy instance. page 8-244
8.45.1 add
Security Policy Context
Creates and adds a new Security Policy Instance.
Syntax
add <name>
Parameters
Example
WS5000.(Cfg).SecurityPolicy> add NewKerberosPolicy
WS5000.(Cfg).SecurityPolicy>
8.45.2 policy
Security Policy Context
Changes the prompt to the context of the named Security Policy instance.
Syntax
policy <name>
Parameters
Example
WS5000.(Cfg).SecurityPolicy> policy Default
WS5000.(Cfg).SecurityPolicy.[Default]>
8.45.3 remove
Security Policy Context
Removes the named Security Policy instance.
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).SecurityPolicy> remove NewKerberosPolicy
WS5000.(Cfg).SecurityPolicy>
8.45.4 show
Security Policy Context
Lists the available Security Policy instances.
Syntax
show Display context specific attributes
show securitypolicy Display security policy details
Parameters
None.
Example
WS5000.(Cfg).SecurityPolicy> show securitypolicy
WS5000.(Cfg).SecurityPolicy>
8-246 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
show Display the attributes of this Security policy instance. page 8-251
CLI Command Reference 8-247
8.46.1 set
Security Policy Instance
Sets an attribute of the Security policy instance. The tables, below, divide the settings into topical groups.
Syntax
set <attribute> <value(s)>
Parameters
General Settings
description Adds a description string to the Security policy instance. set description <text_string>
name Sets the name of the Security policy instance. set name <name_string>
encryption Enables or disables a data encryption type. Possible set encryption <type> <enable>
values:
• open
• wep40
• wep128
• keyguard
• tkip
• ccmp
authentication Enables or disables an authentication type. Possible set authentication <type> <enable>
values are:
• preshared
• kerberos
• eap
You can enter multiple authetication values in the CLI with
a space between each value.
presharedKey Sets the PSK key in either ASCII or Hexidecimal format. An set presharedKey
ASCII key must be between 8 and 63 characters long. A <ascii_or_hex_key>
hex key must be 64 characters.
WEP Settings
activeWepKey Sets the active WEP key string, identified by key index. set activeWepKey <key_index>
Valid key_index values are [0, 3].
8-248 WS 5000 Series System Reference
wepKey Sets the WEP key string for the given key index. Valid set wepKey <key_index> <key
key_index values are [1, 4]. The key_string argument must string>
be enclosed in quotation marks.
Kerberos Settings
kerberos Sets the active WEP key string, identified by key index. set kerberos <key_index>
Valid key_index values are [0, 3].
wepKey Sets the WEP key string for the given key index. Valid set wepKey <key_index>
key_index values are [1, 4]. The key_string argument must <key_string>
be enclosed in quotation marks.
Example
WS5000.(Cfg).SecurityPolicy.[New WEP Security Policy]> set
config_parameter is a required parameter.
Syntax: set <config_parameter>
Valid commands:
set name
set description
set encryption
set authentication
set wepkey
set activewepkey
set kerberos
set eap
set radius
set groupkeyupdate
set presharedkey
set preauthentication
set opppmkcaching
set wepkey
set activewepkey
set kerberos
set eap
set radius
set groupkeyupdate
set presharedkey
set preauthentication
set opppmkcaching
===
8.46.2 show
Security Policy Instance
Display the attributes of this Security policy instance.
Syntax
show Display context specific attributes
show securitypolicy Display security policy details
Parameters
None.
Example
WS5000.(Cfg).SecurityPolicy.[WEP40 Default]> show
WS5000.(Cfg).SecurityPolicy.[WEP40 Default]>
8-252 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.47.1 convert
Sensor Context
This is used to convert the AP 300 to a sensor.
Syntax
convert <ap300 mac>
Parameters
Example
WS5000.(Cfg).sensor> convert 00:A0:F8:BF:8A:6B
WS5000.(Cfg).sensor>
CLI Command Reference 8-253
8.47.2 disable
Sensor Context
Disbales the sensor functionality.
Syntax
disable
Parameters
None
Example
WS5000.(Cfg).sensor> disable
WS5000.(Cfg).sensor>
8.47.3 enable
Sensor Context
Enables the sensor functionality
Syntax
enable
Parameters
None
Example
WS5000.(Cfg).sensor> enable
WS5000.(Cfg).sensor>
8.47.4 revert
Sensor Context
This is used to revert the sensor back to AP.
Syntax
revert <sensor mac>
Parameters
sensor mac MAC address of sensor that needs to be reverted back as AP.
Example
WS5000.(Cfg).sensor> revert 00:A0:F8:BF:8A:6B
Status : Success.
WS5000.(Cfg).sensor>
8.47.5 sensor
Sensor Context
This is used to configure a sensor.
Syntax
sensor <sensor/ap300 mac address>
Parameters
Example
WS5000.(Cfg).sensor> sensor 1
Sensor Details
--------------
DHCP : disable
IP Address : 0.0.0.0
Netmask : 0.0.0.0
Gateway IP Address : 0.0.0.0
Primary WIPS IP : 0.0.0.0
Secondary WIPS IP : 0.0.0.0
WS5000.(Cfg).sensor.[00:A0:F8:AA:BB:CC]>
8.47.6 show
Sensor Context
This displays the sensor context specific attributes.
Syntax
show [display_parameter]
Parameters
Example
WS5000.(Cfg).sensor> show
AP300's
-------
CLI Command Reference 8-255
Sensor AP's
-----------
1. 00:A0:F8:AA:BB:CC
WS5000.(Cfg).sensor>
8-256 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.48.1 description
Sensor Instance
This is used to enter a description text for the sensor.
Syntax
description <description_text>
Parameters
8.48.2 set
Sensor Instance
Used to configure sensor parameters.
Syntax
set <config_parameter> <parameter_value>
Parameters
config_parameter parameter_value
Example
WS5000.(Cfg).sensor.[00:A0:F8:AA:BB:CC]> set dhcp enable
Sensor Details
--------------
DHCP : enable
Primary WIPS IP : 0.0.0.0
Secondary WIPS IP : 0.0.0.0
WS5000.(Cfg).sensor.[00:A0:F8:AA:BB:CC]>
8.48.3 show
Sensor Instance
This command displays the sensor context attributes.
Syntax
show [display_parameter]
Parameters
Example
WS5000.(Cfg).sensor.[00:A0:F8:AA:BB:CC]> show
Sensor Details
--------------
DHCP : enable
Primary WIPS IP : 0.0.0.0
Secondary WIPS IP : 0.0.0.0
WS5000.(Cfg).sensor.[00:A0:F8:AA:BB:CC]>
8-258 WS 5000 Series System Reference
The SNMP context provides commands that configures the SNMP system and that controls the activity of the
SNMP daemon.
Table 8.54 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.54 SNMP Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
set Enable/Disable KDC config through SNMP, and Enable/Disable SNMP traps, page 8-260
Configure SNMP trap destinations.
8.49.1 enable
SNMP Context
Starts the SNMP daemon.
CLI Command Reference 8-259
Syntax
enable
Parameters
None.
Example
WS5000.(Cfg).SNMP> enable
Enabling...
Status : Success.
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Disabled
8.49.2 disable
SNMP Context
Stops the SNMP daemon.
Syntax
disable
Parameters
None.
Example
WS5000.(Cfg).SNMP> disable
Disabling...
Status : Success.
SNMP details:
-------------
SNMP (deamon) Status : Disabled
SNMP Traps : Disabled
8.49.3 remove
SNMP Context
Removes an SNMP trap destination.
Syntax
remove traphost <client_ip> <community_name>
Parameters
Example
WS5000.(Cfg).SNMP> remove traphost 123.121.112.112 testing
Removing SNMP trap-host...
Status : Success.
8-260 WS 5000 Series System Reference
8.49.4 set
SNMP Context
Syntax
set <kdcconfig | snmptrap | traphost>
Parameters
enable_flag Enable or disable Kerberos KDC configuration, as appropriate. Possible values are:
• enable — can configure KDC through SNMP
• disable — cannot configure KDC through SNMP
Example
WS5000.(Cfg).SNMP> set kdcconfig enable
Setting KDC configuration rights...
Status : Success.
Example
WWS5000.(Cfg).SNMP> set snmptrap enable
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Enabled
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Disabled
Parameters
Example
To configure the SNMP v1 trap host at 192.168.204.4, with community name as Symbol, and use port 162,
enter:
WS5100.(Cfg).SNMP> set traphost 192.168.204.4 Symbol 162 v1
Note SNMP v1/v2 trap message format in WS5000 has been implemented such that
the Variable Bindings in the SNMP TRAP PDU, has minimum of two bindings:
name = snmpTrapOID, value = OID of the trap being raised
name = OID of ccTargetTrapString, value = Display String
For v2 traps, the variable binding in the SNMP TRAP PDU also has:
name = OID of sysUpTime, value = current time
8-262 WS 5000 Series System Reference
8.49.5 show
SNMP Context
Displays the various details of the SNMP in the switch.
Syntax
show configaccess
show snmpclients
show snmpstatus
show traphosts
show v3users
Parameters
Example
WS5000.(Cfg).SNMP> show configaccess
SNMP details:
-------------
SNMP (deamon) Status : Enabled
SNMP Traps : Enabled
8.49.6 v2
SNMP Context
Use v2 to configure SNMP v2 access parameters. You need to enter the v2 Context to set the SNMP v2
parameters
Syntax
v2
Parameters
None
Example
WS5000.(Cfg).SNMP> v2
8.49.7 v3
SNMP Context
Use v3 to configure SNMP v3 access parameters. You need to enter the v3 Context to configure the SNMP v3 parameters.
Syntax
v3
Parameters
None
Example
WS5000.(Cfg).SNMP> v3
8.50 v2 Context
SNMP Context
The v2 context provides commands that configure the SNMP v2 access parameters.
Table 8.55 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.55 SNMP v2 Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.50.1 remove
v2 Context
Use remove to remove SNMP v2 client.
Syntax
remove <access-perm> <client_ip> <community_name> [port_no]
Parameters
access-perm The access permission of the SNMP client. Can be one of:
• ro — readonly
• rw — readwrite
Example
WS5000.(Cfg).SNMP.v2> remove rw 172.34.35.68 symbol
8.50.2 set
v2 Context
Sets SNMP attributes
Example
WS5000.(Cfg).SNMP.v2> set client rw 172.34.35.68 symbol
Configuring SNMP client...
Status : Success.
8.50.3 show
v2 Context
Shows SNMP details
Syntax
show
show snmpclients
Parameters
Example
WS5000.(Cfg).SNMP.v2> show
State Port IP Address Community Name
----- ---- ---------- --------------
1. Read/Write 161 172.34.35.68 symbol
8.51 v3 Context
SNMP Context
The v3 context provides commands that configure the SNMP v3 access parameters.
Table 8.55 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.56 SNMP v3 Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.51.1 set
v3 Context
Set SNMP attributes
Example
To set the profile of snmpv3AllRO with algorithm as SHA and with pass phrase as test1234
WS5100.(Cfg).SNMP.v3> set profile snmpv3AllRO SHA test1234
Configuring SNMP client...
Status : Success.
8.51.2 show
v3 Context
Displays the details of the SNMP v3 in the switch
Syntax
show
show v3users
Parameters
Example
WS5000.(Cfg).SNMP.v3> show
Note Do not change the SSH port number because this can create conflicts with
other applications running in the WS5000 Series Switch.
Table 8.57 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.57 SSH Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.52.1 set
SSH (Secure Shell) Context
Configures the SSH daemon.
Syntax
set <attribute> <value>
Parameters
version V1/V2 | V2 Configures the daemon to accept SSH V1 and SSH V2 client connections (V1/V2),
or to only accept SSH V2 (V2). SSH V2 is more secure than SSH V1.
port 22 | 1025 - 65535 Sets the port through which SSH connections are accepted. By default, the SSH
port is set to 22.
8-270 WS 5000 Series System Reference
8.52.2 show
SSH (Secure Shell) Context
Display connection configuration and session information.
Syntax
show <attribute> <value>
Parameters
telnet Display telnet configuration and session information. See 8.58 Telnet Context on page
291
Example
WS5000.(Cfg).SSH> show
WS5000.(Cfg).SSH> show telnet
WS5000.(Cfg).SSH> show ssh
CLI Command Reference 8-271
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
revert certificate Tells the Web server to use the currently installed authentication certificate. page 8-272
8.53.1 enable
SSL (Secure Socket Layer) Context
Turns on SSL client authentication. To access the applet, a client must use https. For example:
https://192.0.0.1
Syntax
enable
Parameters
None.
Example
WS5000.(Cfg).SSL> enable
8.53.2 disable
SSL (Secure Socket Layer) Context
Turns off SSL client authentication. To access the applet, a client must use https. For example:
https://192.0.0.1
8-272 WS 5000 Series System Reference
Syntax
disable
Parameters
None.
Example
WS5000.(Cfg).SSL> disable
8.53.4 show
SSL (Secure Socket Layer) Context
Display the Web server’s accessibility setting.
Syntax
show
show https
Parameters
None.
Example
WS5000.(Cfg).SSL> show
Table 8.59 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands section.
Table 8.59 Standby Context Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
disable Removes the switch from the Standby system. page 8-274
set autorevert Enables or disables the automatic reversion feature. page 8-274
set arDelay Enables or disables the (sending of the) heartbeat on a particular NIC. page 8-275
set heartbeat Sets the heartbeat for the Standby switch. page 8-275
set mac Sets the Ethernet port on the other WS5000 to which this WS5000 sends its page 8-275
heartbeat (per NIC).
set mode Set the mode that the switch should be running in (that is primary, standby, etc.). page 8-276
8.54.1 enable
Standby Context
Adds the switch to the Standby system.
Syntax
enable
Parameters
None.
Example
WS5000.(Cfg).standby> enable
8.54.2 disable
Standby Context
Removes the switch from the Standby system.
Syntax
disable
Parameters
None.
Example
WS5000.(Cfg).standby> disable
Note Be sure to call the disable command before calling this command.
“Auto-revert delay.” If auto-revert is enabled, this is the amount of time to wait, in minutes, before the Primary
switch becomes active after it has come back up.
Syntax
set autorevert <enable_flag>
Parameters
Example
WS5000.(Cfg).standby> set autorevert enable
CLI Command Reference 8-275
Syntax
set arDelay <delay>
Parameters
delay The delay time, in minutes. An integer in the range [0, 9999].
Example
WS5000.(Cfg).StandBy> set ardelay 10
enable_flag Valid values are enable, to enable the heartbeat, or disable—to disable the heartbeat.
Example
WS5000.(Cfg).standby> set heartbeat enable
Syntax
set mac <port> <NIC>
8-276 WS 5000 Series System Reference
Parameters
port Either the MAC address of the port, or auto for automatic discovery.
NIC The local NIC through which the heartbeat is sent. Either 1 or 2.
Example
WS5000.(Cfg).standby> set mac auto 1
Syntax
set mode <option>
Parameters
option Description
enable Adds the switch to the standby system. Same as the enable command.
disable Removes the switch from the standby system. Same as the disable command.
8.54.8 show
Standby Context
Display Standby details for the switch.
Syntax
show
Parameters
None.
CLI Command Reference 8-277
Example
WS5000.(Cfg).StandBy> show
Standby Management:
Interface (Ethernet) 1
----------------------
StandBy Heart-Beat MAC : Auto Discovery Enabled
Heart-Beat status : Enable
Received Heart-Beat : No
Interface (Ethernet) 2
----------------------
StandBy Heart-Beat MAC : Auto Discovery Enabled
Heart-Beat status : Disable
Received Heart-Beat : No
WS5000.(Cfg).StandBy>
8-278 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.55.1 add
Switch Policy (SPolicy) Context
Creates and adds a new Switch Policy instance.
Syntax
add <name>
Parameters
Example
WS5000.(Cfg).SPolicy> add new_policy
8.55.2 policy
Switch Policy (SPolicy) Context
Changes the prompt to the context to the named Switch policy instance.
Syntax
policy <name>
Parameters
Example
WS5000.(Cfg).SPolicy> policy sw1
Active Switch Policy details
----------------------------
Policy Name : sw1
Description :
Country : US
Channel for .11a : Auto (once)
Channel for .11b : Auto (once)
Channel for .11g : Auto (once)
Power Level for .11a : 20 dBm
Power Level for .11b : 20 dBm
Power Level for .11g : 20 dBm
Active EtherPolicy Name : eth1
# of APPolicies attached : 1
Default Adoption action for .11a : Adopt .11a with APPolicy appol1
Default Adoption action for .11b : Adopt .11b with APPolicy appol1
WS5000.(Cfg).SPolicy.[sw1]>
8.55.3 remove
Switch Policy (SPolicy) Context
Removes the named Switch Policy instance.
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).SPolicy> remove new_policy
WS5000.(Cfg).SPolicy>
8.55.4 show
Switch Policy (SPolicy) Context
Display switch policy details, or details about other entities if specified in the command.
Syntax
show Display context specific attributes
show accessports Display access port details
show acl Display ACL information
show appolicy Display Access Port Policy
show channelinfo Display channel no and country code details
show ethernet Display Ethernet Port details
show etherpolicy Display EtherPolicy details
show interfaces Display interface details
show securitypolicy Display security policy details
show switchpolicy Display Switch Policy
show system Display system information
CLI Command Reference 8-281
Parameters
component Description
channelInfo Display a list of country codes and the channels each country supports.
interfaces Display a list of Access Port instances and lists the available Ethernet ports.
Example
WS5000.(Cfg).SPolicy> show
Active Switch Policy details
----------------------------
Policy Name : Default Wireless Switch Policy
Description : Switch Policy with Default Settings
Country : None
Channel for .11a : Auto (once)
Channel for .11b : Auto (once)
Channel for .11g : Auto (once)
Power Level for .11a : 20 dBm
Power Level for .11b : 20 dBm
Power Level for .11g : 20 dBm
Active EtherPolicy Name : Default Ethernet Policy
# of APPolicies attached : 1
Default Adoption action for .11a : Adopt .11a with APPolicy Default Access Porty
Default Adoption action for .11b : Adopt .11b with APPolicy Default Access Porty
Default Adoption action for FH : Adopt FH with APPolicy Default Access Port Py
Default Adoption action for .11g : Adopt .11g with APPolicy Default Access Porty
DS Coexistence : Disabled
WS5000.(Cfg).SPolicy>
WS5000.(Cfg).SPolicy>
WS5000.(Cfg).SPolicy> show channelinfo
A Ch: 36,40,44,48,52,56,60,64,149,153,11
Austria AT B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64,100,104,10
Bahrain BH B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Belarus BL B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Belgium BE B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64
Brazil BR B Ch: 1-11 G Ch: 1-11 FH Ch: 2-80
A Ch: 149,153,157,161
Bulgaria BG B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch:
Canada CA B Ch: 1-13 G Ch: 1-13 FH Ch: 2-80
A Ch: 36,40,44,48,52,56,60,64,149,153,11
Press any key to continue...or (q)uit
CLI Command Reference 8-283
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
name Set or change the name of the switch policy. page 8-284
set adoptionList Adds/removes an entry to/from the access port adoption-inclusion and page 8-285
adoption-exclusion lists.
set Configure various parameters for the switch policy (name, description, country page 8-286
code, channel, power, AP policy, Ethernet policy, DS co-existence).
8.56.1 description
Switch Policy Instance
Set description text.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy]> description Sample descrn
Adding description...
Status : Success.
Default Adoption action for .11a : Adopt .11a with APPolicy Default Access Porty
Default Adoption action for .11b : Adopt .11b with APPolicy Default Access Porty
Press any key to continue...or (q)uit
8.56.2 edit
Switch Policy Instance
Edit adoption list entry to include or exclude a radio type. Same as “include” and “exclude” options within the
set adoptionList command.
Syntax
edit include <old_radio_type> <start_MAC> [<end_MAC>] <app_name | remove>
edit exclude <old_radio_type> <start_MAC> [<end_MAC>] [remove]
Parameters
old_radio_radio The radio type that this list applies to. Valid values are: A, B, G, or FH (case-insensitive).
For exclude, ALL is also a valid value.
start_MAC, end_MAC Identifies the access ports that are part of this list entry. If end_MAC is excluded, the
entry consists of the AP identified by start_MAC; otherwise, the entry contains all APs
between start_MAC and end_MAC.
remove Removes the entry from the list. To remove an address range, you need only supply the
starting address.
Example
8.56.3 name
Switch Policy Instance
Set or change the name of the switch policy. Same as when “name” parameter is used with the set command.
Syntax
name <new_name>
CLI Command Reference 8-285
Parameters
new_name New name to set or change the switch policy name to.
Example
WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy]> name newname
Configuring name...
Status : Success.
WS5000.(Cfg).SPolicy.[newname]>
8.56.4 restrictedchannel
Switch Policy Instance
Changes the prompt to the Restricted Channel context, where channels that cannot be chosen by Automatic
Channel Selection for a particular radio type can be specified.
See Restricted Channel Instance on page 8-289 for more details.
Syntax
restrictedchannel <radio_type>
Parameters
radio_type Type of radio to configure restricted channels for. Valid values are a, b, g, for 802.11a,
802.11b, or 802.11g, respectively.
Example
WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy]> restrictedchannel A
Syntax
set adoptionList <radio> include <start_MAC> [<end_MAC>] <app_name | remove>
set adoptionList <radio> exclude <start_MAC> [<end_MAC>] [remove]
set adoptionList <radio> default allow <app_name>
set adoptionList <radio> default deny [traps <enable | disable>]
Parameters
radio The radio type that this list applies to. Valid values are: A, B, G, or FH (case-insensitive).
For exclude, ALL is also a valid value.
start_MAC, end_MAC Identifies the access ports that are part of this list entry. If end_MAC is excluded, the
entry consists of the AP identified by start_MAC; otherwise, the entry contains all APs
between start_MAC and end_MAC.
remove Removes the entry from the list. To remove an address range, you need only supply the
starting address.
traps <enable | disable> If the default action is deny, you can ask to have the apAdoptFail SNMP trap sent when
an unknown AP asks to be adopted. Pass enable to ask for the trap, and disable to ask
that the trap not be sent. By default the trap is sent.
Example
8.56.6 set
Switch Policy Instance
Configures the switch policy. Adds or removes an access port policy to or from the switch policy.
Syntax
set <attribute> <value> [remove]
Parameters
apPolicy name [remove] Adds or removes the named Access Port Policy to/from the Switch Policy’s list
of AP Policies.
channel <integer> Sets the default channel. The set of candidate channel numbers depends on
the country code setting.
countryCode <ISO_3166_code> Sets the country code. The switch won’t adopt Access Ports until the country
is set.
power <power_setting> <radio_type> Sets the power, in milliWatts, for the specified 802.11x radio type. Valid
power settings are in the range 4 through 20.
Valid radio types are a, b, g, for 802.11a, 802.11b, or 802.11g respectively.
8.56.7 show
Switch Policy Instance
Display details about the switch policy instance, or other entities if specified in the command.
Syntax
show Display context specific attributes
show accessports Display access port details
show acl Display ACL information
show appolicy Display Access Port Policy
show channelinfo Display channel no and country code details
show ethernet Display Ethernet Port details
show etherpolicy Display EtherPolicy details
show interfaces Display interface details
show restrictedchannels Display the restricted channels
show securitypolicy Display security policy details
show switchpolicy Display Switch Policy
show system Display system information
Parameters
None.
Example
WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy]> show
Active Switch Policy details
----------------------------
Policy Name : Default Wireless Switch Policy
Description : Switch Policy with Default Settings
Country : None
Channel for .11a : Auto (once)
Channel for .11b : Auto (once)
Channel for .11g : Auto (once)
Power Level for .11a : 20 dBm
Power Level for .11b : 20 dBm
Power Level for .11g : 20 dBm
Active EtherPolicy Name : Default Ethernet Policy
8-288 WS 5000 Series System Reference
# of APPolicies attached : 1
Default Adoption action for .11a : Adopt .11a with APPolicy Default Access Porty
Default Adoption action for .11b : Adopt .11b with APPolicy Default Access Porty
Default Adoption action for FH : Adopt FH with APPolicy Default Access Port Py
Default Adoption action for .11g : Adopt .11g with APPolicy Default Access Porty
DS Coexistence : Disabled
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.57.1 add
Restricted Channel Instance
Add a channel to the list of restricted channels. Use show channelinfo to see a list of channels for the radio
type for which instance you are in.
Syntax
add channel [optional_description]
Parameters
channel_num The channel that you want to restrict. The set of valid channel numbers depends on the
country setting and radio type.
Example
WS5000.(Cfg).SPolicy.[Name].Restricted.[Radio]> add channel 153
Adding 153 to the restricted list...
Status: Success.
WS5000.(Cfg).SPolicy.[Name].Restricted.[Radio]>
8-290 WS 5000 Series System Reference
8.57.2 remove
Restricted Channel Instance
Remove a channel from the list of restricted channels, thus making it available for use during Automatic
Channel Selection.
Syntax
remove <channel_num>
Parameters
channel_num The channel that you want to “unrestrict”. The set of valid channel numbers depends on
the country setting and radio type.
Example
WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy].Restricted.[A]> remove 153
8.57.3 show
Display restricted channel details.
Syntax
show
or
show <attribute>
Parameters
attribute Description
channelInfo Display a list of country codes and the channels each country supports. If channelInfo is
not used, a list of restricted channels is displayed.
Example
WS5000.(Cfg).SPolicy.[Default Wireless Switch Policy].Restricted.[A]> show
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
set Configure telnet services, such as enabling/disabling for configuration to be done page 8-292
via the KDC.
8.58.1 enable
Telnet Context
Enable the port/service on the switch to enable Telnet configuration through the CLI.
Syntax
enable
Parameters
None.
Example
WS5000.(Cfg).Telnet> enable
Enabling...
Status : Success.
WS5000.(Cfg).Telnet>
8-292 WS 5000 Series System Reference
8.58.2 disable
Telnet Context
Disable the port/service on the switch to enable Telnet configuration via the CLI.
Syntax
disable
Parameters
None.
Example
WS5000.(Cfg).Telnet> disable
WARNING: This will disable all remote (CLI) access to the switch.
Do you want to continue (yes/no)? : n
WS5000.(Cfg).Telnet>
8.58.3 set
Telnet Context
WS5000.(Cfg).Telnet> set kdcConfig
Enables or disables on-board KDC configuration through telnet.
Syntax
set <attribute>
Parameters
attribute Description
kdcConfig <enable_flag> Enable or disable whether KDC configuration can be performed via Telnet connections.
Possible values are: enable, disable.
Example
WS5000.(Cfg).Telnet> set kdcconfig enable
Setting KDC configuration rights...
Status : Success.
WS5000.(Cfg).Telnet>
CLI Command Reference 8-293
8.58.4 show
Telnet Context
Display Telnet-related details based on the attribute used with the command.
Syntax
show
or
show <attribute>
Parameters
attribute Description
configAccess Display the permissibility of configuring the system and the KDC through telnet and
SNMP.
ssh Display information about the ssh configuration. See SSH (Secure Shell) Context for
more details.
Example
WS5000.(Cfg).Telnet> show
WS5000.(Cfg).Telnet>
8-294 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.59.1 show
Tunnel Context
Display Tunnel-related details based on the attribute used with the command.
Syntax
show
or
show tunnels
Parameters
attribute Description
Example
WS5000.(Cfg).Tunnel> show
Tunnel Details...
WS5000.(cfg).Tunnel>
CLI Command Reference 8-295
8.59.2 tunnel
Tunnel Context
Display Tunnel-related details based on the attribute used with the command.
Syntax
tunnel
or
tunnel <attribute>
Parameters
attribute Description
Mode GRE
Example
WS5000.(Cfg).Tunnel> tunnel
Tunnel details...
Name : tunnel1
Description : tunnel one
Mode : GRE
State : active
Remote IP Address : none
Time To Live : 255
Keepalive : 0
WS5000.(Cfg).Tunnel>
8-296 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.60.1 set
Tunnel Instance
Sets the value of an attribute of this tunnel instance.
Syntax
set <config_parameter>, <parameter_value>
set remote_ip <new_remote_ip/none>
where
config_parameter Tunnel parameter to be cofigured.
parameter_value Value for the Tunnel parameter.
Parameters
keepalive Change Keepalive timer of the tunnel. Value ranges from 0-5
Example
WS5000.(Cfg).Tunnel.[tunnel1]> set remote_ip 1.1.1.1
Tunnel details...
Name : tunnel1
Description : tunnel one
Mode : GRE
State : active
Remote IP Address : 1.1.1.1
CLI Command Reference 8-297
WS5000.(Cfg).Tunnel.[tunnel1]>
8.60.2 show
Tunnel Instance
Display Tunnel-related details based on the attribute used with the command.
Syntax
show
or
show <attribute>
Parameters
Example
WS5000.(Cfg).Tunnel.[tunnel1]> show
Tunnel details...
Name : tunnel1
Description : tunnel one
Mode : GRE
State : active
Remote IP Address : 1.1.1.1
Time To Live : 255
Keepalive : 0
Clear IP DF : disable
WS5000.(Cfg).Tunnel.[tunnel1]>
8-298 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
user Select a user to configure (and drop into specified user instance). page 8-300
8.61.1 add
User Context
Adds a new user to the switch. You are prompted to provide and then confirm the new user’s password.
Syntax
add <user_name>
Parameters
user_name The name (login) of the new user. The name can be 6 to 20 characters long.
Example
WS5000.(Cfg).User> add mktgmgr
Enter User Password (6 - 20 characters) : ******
Re-Enter User Password (6 - 20 characters) : ******
Adding user...
Status: Success.
User information
Available Users:
1. admin.
2. efeaheny.
3. mktgmgr.
User information
WS5000.(Cfg).User.[mktgmgr]>
8.61.2 remove
User Context
Removes an existing user from the switch.
Syntax
remove <user_name>
Parameters
Example
WS5000.(Cfg).User> remove mktgmgr
Removing user...
Status: Success.
User information
Available Users:
1. admin.
8-300 WS 5000 Series System Reference
2. techsupport.
WS5000.(Cfg).User>
8.61.3 user
User Context
Select a user to configure and drop into specified user instance context.
Syntax
user <user_name>
Parameters
Example
WS5000.(Cfg).User> user admin
User information
WS5000.(Cfg).User.[admin]>
8.61.4 show
User Context
Display a summary of all available users within the system, or details about a specific user, if specified.
Syntax
show
or
show <user_name>
Parameters
user_name User name for which details will be displayed. If no user name parameter, then display
a summary of all available users in the system.
Example
WS5000.(Cfg).User> show
User information
Available Users:
1. admin.
2. techsupport.
WS5000.(Cfg).User>
8-302 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.62.1 allow
User Instance
Sets the list of subsystems that you can configure.
Syntax
allow <subsystem1> [<subsystem2>] [...]
Parameters
subsystemN The subsystem that you can configure with one or more of the following possible values:
• all
• default
• system
• policy
• security
• SNMP
Example
8.62.2 deny
User Instance
WS5000.(Cfg).User.[Name]> deny
Sets the list of subsystems that you cannot configure.
Syntax
deny <subsystem1> [<subsystem2>] [...]
Parameters
subsystemN The subsystem that you cannot configure with one or more of the following possible
values:
• all
• default
• system
• policy
• security
• SNMP
Example
WS5000.(Cfg).User.[Name]> deny SNMP policy security
8.62.3 password
User Instance
Set the user password. You are prompted to provide a new password and then confirm the new password.
8-304 WS 5000 Series System Reference
Syntax
password
Parameters
None.
Example
WS5000.(Cfg).User.[admin]> password
Creating the Event list...
WS5000.(Cfg).User.[admin]>
8.62.4 show
User Instance
Show the details of the user instance.
Syntax
show
Parameters
None.
Example
WS5000.(Cfg).User.[admin]> show
User information
WS5000.(Cfg).User.[admin]>
CLI Command Reference 8-305
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.63.1 add
WLAN Context
Creates and adds a new WLAN instance.
Syntax
add <WLAN_name>
Parameters
Example
WS5000.(Cfg).WLAN> add EastCoastWLAN 124
Adding WLAN...
Status: Success.
WLAN details...
Name : Symbol Default
ESSID # : 101
Description : Default WLAN
Security Policy : Default
WLAN Auth. Status : Authenticated
Kerberos auth. name : 101
ACL Attached : None
Accept any ESSID : Disable
Secured Beacon : Disable
Mu Traffic : MU to MU Allow
Maximum MUs allowed : 4096
Current MUs : 0
Default Route : 0.0.0.0
Network Mask : 0.0.0.0
WME Enabled : Disabled
WME Profile : Default MU WME Profile
WS5000.(Cfg).WLAN.[EastCoastWLAN]>
8.63.2 remove
WLAN Context
Removes a WLAN from the system
Syntax
remove <name>
Parameters
Example
WS5000.(Cfg).WLAN> remove <WLAN_name>
CLI Command Reference 8-307
8.63.3 show
WLAN Context
Display summary details about all available WLAN instances, or specific details about a WLAN instance if the
instance is called out as a parameter.
Syntax
show
or
show [WLAN_name]
Parameters
WLAN_name When a WLAN_name is indicated, details about that WLAN instance is shown.
Otherwise, with no parameter, a summary list of all WLAN instances is shown.
Example
WS5000.(Cfg).WLAN> show
WS5000.(Cfg).WLAN>
or
WS5000.(Cfg).WLAN> show "Secure Access"
WLAN details...
Name : Secure Access
ESSID # : secure
Description : Default WLAN
Security Policy : Kerberos Default
WLAN Auth. Status : Not-Authenticated
ACL Status : Disabled
ACL Attached : None
Accept any ESSID : Enable
Secured Beacon : Disable
Broadcast Encryption : Wep128(11a), Wep128(11b/11g), Wep128(FH)
Mu Traffic : MU to MU Allow
Maximum MUs allowed : 4096
Current MUs : 0
Default Route : 0.0.0.0
Network Mask : 0.0.0.0
WS5000.(Cfg).WLAN>
8.63.4 wlan
WLAN Context
Syntax
wlan <name>
8-308 WS 5000 Series System Reference
Parameters
Example
WS5000.(Cfg).WLAN> wlan "Secure Access"
WLAN details...
Name : Secure Access
ESSID # : secure
Description : Default WLAN
Security Policy : Kerberos Default
WLAN Auth. Status : Not-Authenticated
ACL Status : Disabled
ACL Attached : None
Accept any ESSID : Enable
Secured Beacon : Disable
Broadcast Encryption : Wep128(11a), Wep128(11b/11g), Wep128(FH)
Mu Traffic : MU to MU Allow
Maximum MUs allowed : 4096
Current MUs : 0
Default Route : 0.0.0.0
Network Mask : 0.0.0.0
WS5000.(Cfg).WLAN.[Secure Access]>
CLI Command Reference 8-309
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
name Set or change the name of the WLAN instance. page 8-310
set Configure the WLAN instance. Configurable parameters include name, ESSID, page 8-310
description, security, Kerberos name, MU acl, acl, broadcast ESS, secured beacon,
MU traffic, maximum MUs, default route.
8.64.1 description
WLAN Instance
Set description text.
Syntax
description <description_text>
Parameters
Example
WS5000.(Cfg).WLAN.[Symbol Default]> description “Sample description text”
Adding description...
Status : Success.
WLAN details...
Name : Symbol Default
ESSID # : 101
Description : Sample description text
Security Policy : Default
WLAN Auth. Status : Authenticated
Kerberos auth. name : 101
ACL Status : Disabled
ACL Attached : None
Accept any ESSID : Disable
8-310 WS 5000 Series System Reference
WS5000.(Cfg).WLAN.[Symbol Default]>
8.64.2 name
WLAN Instance
Changes the name of the WLAN instance.
Syntax
name <new_name>
Parameters
Example
WS5000.(Cfg).WLAN.[Name]> name new_name
8.64.3 set
WLAN Instance
Sets the value of an attribute of this WLAN instance.
Syntax
set <attribute> <value>
Parameters
acl <acl_name/none> Sets the WLAN’s Access Control List. See Access Control List (ACL) Context
for more details.
securedbeacon <enable_flag> Enable or disable the secured beacon. Possible values are: enable, disable.
maxmus <1 - 4096> Sets the maximum number of Mobile Units that may be asssociated through
this WLAN.
muacl <enable_flag> Enable or disable the WLAN’s Access Control List. Possible values are:
enable, disable.
CLI Command Reference 8-311
mutraffic <allow_flag> Specifies what to do with mobile unit traffic passed through the switch.
Possible values are: allow, disallow, drop.
security <security_policy_name> Sets the Security policy that’s applied to this WLAN.
broadcastess <enable_flag> Enable or disable broadcast ESS. Possible values are: enable, disable.
Example
8.64.4 show
WLAN Instance
Show details about the WLAN instance.
Syntax
show Display context specific attributes
show acl Display ACL information
show securitypolicy Display security policy details
show wlan Display WLAN details
Parameters
None.
Example
WS5000.(Cfg).WLAN.[Symbol Default]> show
WLAN details...
Name : Symbol Default
ESSID # : 101
Description : Sample description text
Security Policy : Default
WLAN Auth. Status : Authenticated
Kerberos auth. name : 101
ACL Status : Disabled
ACL Attached : None
Accept any ESSID : Disable
Secured Beacon : Disable
Broadcast Encryption : Open(11a), Open(11b/11g), Open(FH)
Mu Traffic : MU to MU Allow
Maximum MUs allowed : 4096
Current MUs : 0
Default Route : 0.0.0.0
Network Mask : 0.0.0.0
WS5000.(Cfg).WLAN.[Symbol Default]>
8-312 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.65.1 add
WME Context
Creates and adds a new WME Profile to the instance.
Syntax
add <WME_ProfileName>
Parameters
Example
WS5000.(Cfg).WME> add symbol3
# of params = 1
param #0 = symbol3
Adding WME...
Status: Success.
eCWMin [VO/AC1] : 2
eCWMax [VO/AC1] : 3
Txop Lim [VO/AC1] : 102/[b] 47/[a/g]
AIFSN [VO/AC1] : 2
eCWMin [VI/AC2] : 3
eCWMax [VI/AC2] : 4
Txop Lim [VI/AC2] : 188/[b] 94/[a/g]
AIFSN [VI/AC2] : 2
eCWMin [BE/AC3] : 4
eCWMax [BE/AC3] : 10
Txop Lim [BE/AC3] : 0/[b] 0/[a/g]
AIFSN [BE/AC3] : 3
eCWMin [BK/AC4] : 4
eCWMax [BK/AC4] : 10
Txop Lim [BK/AC4] : 0/[b] 0/[a/g]
AIFSN [BK/AC4] : 7
WS5000.(Cfg).WME.[symbol3]>
8-314 WS 5000 Series System Reference
8.65.2 remove
WME Context
Removes a WME from the system
Syntax
remove <wmeProfileName>
Parameters
Example
WS5000.(Cfg).WME> remove symbol2
WS5000.(Cfg).WME>
8.65.3 show
WME Context
Display summary details about all available WME profiles.
Syntax
show
or
show wme
Parameters
None.
Example
WS5000.(Cfg).WME> show
WS5000.(Cfg).WME>
8.65.4 wme
WME Context
Syntax
wme <wme_profile_name>
CLI Command Reference 8-315
Parameters
Example
WS5000.(Cfg).WME> wme symbol1
eCWMin [VO/AC1] : 2
eCWMax [VO/AC1] : 3
Txop Lim [VO/AC1] : 102/[b] 47/[a/g]
AIFSN [VO/AC1] : 2
eCWMin [VI/AC2] : 3
eCWMax [VI/AC2] : 4
Txop Lim [VI/AC2] : 188/[b] 94/[a/g]
AIFSN [VI/AC2] : 2
eCWMin [BE/AC3] : 4
eCWMax [BE/AC3] : 10
Txop Lim [BE/AC3] : 0/[b] 0/[a/g]
AIFSN [BE/AC3] : 3
eCWMin [BK/AC4] : 4
eCWMax [BK/AC4] : 10
Txop Lim [BK/AC4] : 0/[b] 0/[a/g]
AIFSN [BK/AC4] : 7
WS5000.(Cfg).WME.[symbol1]>
8-316 WS 5000 Series System Reference
8.66.1 description
WME Instance
Set description text to the policy or item in the selected context.
description <description_text>
Parameters
Example
WS5000.(Cfg).WME.[symbol1]> description <Sample Text for Symbol1>
Adding description...
Status : Success.
eCWMin [VO/AC1] : 2
eCWMax [VO/AC1] : 3
Txop Lim [VO/AC1] : 102/[b] 47/[a/g]
AIFSN [VO/AC1] : 2
CLI Command Reference 8-317
eCWMin [VI/AC2] : 3
eCWMax [VI/AC2] : 4
Txop Lim [VI/AC2] : 188/[b] 94/[a/g]
AIFSN [VI/AC2] : 2
eCWMin [BE/AC3] : 4
eCWMax [BE/AC3] : 10
Txop Lim [BE/AC3] : 0/[b] 0/[a/g]
AIFSN [BE/AC3] : 3
eCWMin [BK/AC4] : 4
eCWMax [BK/AC4] : 10
Txop Lim [BK/AC4] : 0/[b] 0/[a/g]
AIFSN [BK/AC4] : 7
WS5000.(Cfg).WME.[symbol1]>
8.66.2 name
WME Instance
Changes the name of the WME Profile.
Syntax
name <name>
Parameters
Example
WS5000.(Cfg).WME.[symbol3]> name <symbol3>
Configuring name...
Status : Success.
WS5000.(Cfg).WME.[<symbol3>]>
8.66.3 set
WME Instance
Sets the value of an attribute of this WME Profile.
Syntax
set <ac> <configParam> <value>
8-318 WS 5000 Series System Reference
Parameters
8.66.4 show
WME Instance
Show details about the WME Profile.
Syntax
show [display_parameter]
Parameters
Example
WS5000.(Cfg).WME.[symbol1]> show
eCWMin [VO/AC1] : 2
eCWMax [VO/AC1] : 3
Txop Lim [VO/AC1] : 102/[b] 47/[a/g]
AIFSN [VO/AC1] : 2
eCWMin [VI/AC2] : 3
eCWMax [VI/AC2] : 4
Txop Lim [VI/AC2] : 188/[b] 94/[a/g]
AIFSN [VI/AC2] : 2
eCWMin [BE/AC3] : 4
eCWMax [BE/AC3] : 10
Txop Lim [BE/AC3] : 0/[b] 0/[a/g]
AIFSN [BE/AC3] : 3
eCWMin [BK/AC4] : 4
eCWMax [BK/AC4] : 10
Txop Lim [BK/AC4] : 0/[b] 0/[a/g]
AIFSN [BK/AC4] : 7
WS5000.(Cfg).WME.[symbol1]>
CLI Command Reference 8-319
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
directory Display the uploaded WVPN files from local repository. page 8-321
8.67.1 auth
WVPN Context
This command is used to configure authentication settings.
Syntax
auth
Parameters
None
Example
WS5000.(Cfg).wvpn> auth
Authentication Management:
WS5000.(Cfg).wvpn.auth>
8.67.2 cert
WVPN Context
This command is used to configure certificate settings. This command changes the context to cert. For details
of cert context see cert Instance on page 8-327
Syntax
cert
Parameters
None
Example
WS5000.(Cfg).wvpn> cert
Certificate Management:
CLI Command Reference 8-321
WS5000.(Cfg).wvpn.cert>
8.67.3 ddns
WVPN Context
This command is used to configure DDNS settings.This command changes the context to ddns. For details of
cert context see ddns Instance on page 8-332
Syntax
ddns
Parameters
None
Example
WS5000.(Cfg).wvpn> ddns
DDNS Settings:
WS5000.(Cfg).wvpn.ddns>
8.67.4 directory
WVPN Context
This comand is used to display the uploaded WVPN files from local repository.
Syntax
dir
Parameters
None
Example
WS5000.(Cfg).wvpn> dir
total 1
-rw-r--r-- 1 nobody root 429 Jan 18 13:55 CA_WVPN.cer
WS5000.(Cfg).wvpn>
8-322 WS 5000 Series System Reference
8.67.5 disable
WVPN Context
This command is used to disable the interface/service in CC.
Syntax
disable
Parameters
None
Example
WS5000.(Cfg).wvpn> disable
Disabling...
Status : Success.
WVPN Management:
WS5000.(Cfg).wvpn>
8.67.6 enable
WVPN Context
This command is used to enable the interface/service.
Syntax
enable
Parameters
None
Example
WS5000.(Cfg).wvpn> enable
Enabling...
Status : Success.
WVPN Management:
WS5000.(Cfg).wvpn>
8.67.7 ip_pools
WVPN Context
This command is used to configure ip pools.This command changes the context to ip_pools. For details of cert
context see 8.70 ip pools Instance on page 338
Syntax
ip_pools [pool_name]
Parameters
pool_name The ip pool that you wish to configure for the WVPN.
Example
WS5000.(Cfg).wvpn> ip
WVPN IP Pools:
DHCP Enabled : no
Use DHCP Gateway : no
Available Pools:
1. Default.
WS5000.(Cfg).wvpn.ip_pools>
8.67.8 rt
WVPN Context
This command is used to see VPN runtime session info. This command changes the context to rt. For details
of cert context see 8.71 rt Instance on page 344
Syntax
rt
Parameters
None
Example
WS5000.(Cfg).wvpn> rt
1 VPN sessions
'*' indicates inactive VPN tunnel.
WS5000.(Cfg).wvpn.rt>
8-324 WS 5000 Series System Reference
8.67.9 set
WVPN Context
This command is used to configure WVPN Management attributes.
Syntax
set <parameter> <value>
Parameters
Example
WS5000.(Cfg).wvpn> set session_timeout 150
WVPN Management:
WS5000.(Cfg).wvpn>
8.67.10 show
WVPN Context
This command displays the details about the WVPN specific attributes like — Auth general settings, installed
certificates, DDNS settings, pool information, VPN session details, VPN runtime summary, WTLS general
settings and WVPN general settings.
CLI Command Reference 8-325
Syntax
show
show auth
show certs
show ddns
show ip_pools
show session
show sessions
show wtls
show wvpn
Parameters
Example
WS5000.(Cfg).wvpn> show auth
Authentication Management:
WS5000.(Cfg).wvpn>
8-326 WS 5000 Series System Reference
8.67.11 wtls
WVPN Context
This command is used to configure system WTLS settings.This command changes the context to wtls. For
details of cert context see 8.72 wtls Instance on page 347
Syntax
wtls
Parameters
None
Example
WS5000.(Cfg).wvpn> wtls
WTLS Settings:
Server number: : 1
Security mode: : defaultSecurity
Wanted FIPS mode: : Unavailable
Cipher: : AES128
MAC: : SHA_160
Minimum client RSA key size: : 1024 bits
Maximum client RSA key size: : 4096 bits
Minimum RSA key size: : 1024 bits
Maximum RSA key size: : 4096 bits
Handshake timeout: : 0h 1m( 90 secs)
Require client certificates: : false
Key refresh: : 256 packets
WS5000.(Cfg).wvpn.wtls>
CLI Command Reference 8-327
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
directory Display the uploaded WVPN files from local repository. page 8-327
purge Deletes a certificate file from the local repository. page 8-329
tftpImport Download & Import Certificates from remote location. page 8-330
8.68.1 directory
cert Instance
Display the uploaded WVPN files from local repository.
Syntax
directory
Parameters
None
Example
WS5000.(Cfg).wvpn.cert> dir
total 1
-rw-r--r-- 1 nobody root 429 Jan 18 13:55 CA_WVPN.cer
WS5000.(Cfg).wvpn.cert>
8-328 WS 5000 Series System Reference
Parameters
Example
WS5000.(Cfg).wvpn.cert> dump cert CA_WVPN.cer
Certificate Information:
WS5000.(Cfg).wvpn.cert>
8.68.3 import
cert Instance
This command is used to install certificates.
Syntax
import caCert <caCertFile>
import serverCert <serverPkcs12KeyFile> <passwd> [<serverCertFile>]
Parameters
CaCertFile The CA certificate file that you want import and install.
passwd password to decrypt the Pkcs12 format server certificate file (*.pl2 file).
serverCertFile The server certificate file (*.cer file) that you want to import.
Example
WS5000.(Cfg).wvpn.cert> import ca /image/CA_WVPN.cer
Certificate Management:
WS5000.(Cfg).wvpn.cert>
8.68.4 purge
cert Instance
This command is used to delete a certificate file from the local repository.
Syntax
purge <file_name>
Parameters
filename The name of the certificate file that you want to purge or delete.
Example
WS5000.(Cfg).wvpn.cert> purge CA_WVPN.cer
WS5000.(Cfg).wvpn.cert>
8.68.5 remove
cert Instance
This command is used to remove installed certificates.
Syntax
remove <cert_type> [<index>]
remove caCert <index> removes CA Certificate (index required)
remove serverCert removes Server Certificate (no index used)
Parameters
Example
WS5000.(Cfg).wvpn.cert> remove ca 1
Certificate Management:
WS5000.(Cfg).wvpn.cert>
8.68.6 show
cert Instance
This command is used to view all the installed certificates information.
Syntax
show certs to see all installed certificates.
show [index] to see a installed CA certificate.
show server to see the installed server certificate.
Parameters
Example
WS5000.(Cfg).wvpn.cert> show
Certificate Management:
WS5000.(Cfg).wvpn.cert>
8.68.7 tftpImport
cert Instance
This command is used to download and import certificates from remote location.
Syntax
tftpImport caCert <ipAddr> <caCertFile>
tftpImport serverCert <ipAddr> <serverPkcs12KeyFile> <passwd> [<serverCertFile>]
Parameters
ipAdd IP address of the tftp server from where the CA certificate needs to be downloaded.
ipAddr IP address of the tftp server from where the CA certificate needs to be downloaded.
passwd password to decrypt the Pkcs12 format server certificate file (*.pl2 file).
Example
WS5000.(Cfg).wvpn.cert> tftpI CA 192.168.1.1 CA_WVPN.cer
Certificate Management:
WS5000.(Cfg).wvpn.cert>
8-332 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.69.1 add
ddns Instance
This command is used to add DNS Server attributes.
Syntax
add <add_parameter> <value>
Parameters
Example
WS5000.(Cfg).wvpn.ddns> add dnsServerAddr 192.168.1.3
CLI Command Reference 8-333
Adding dynamicDnsSettings.addDnsAddr....
Status : Success.
DDNS Settings:
Adding dynamicDnsSettings.addReverseZone....
Status : Success.
DDNS Settings:
WS5000.(Cfg).wvpn.ddns>
8.69.2 clearClientDns
ddns Instance
Use clearClientDns to clear client DNS table at DNS server.
Syntax
clearClientDns
Parameters
None
Example
WS5000.(Cfg).wvpn.ddns> clearClientDns
DDNS Settings:
2. 2.168.192.in-addr.arpa.
DNS Servers :
1. 192.168.1.1
2. 192.168.1.3
WS5000.(Cfg).wvpn.ddns>
8.69.3 disable
ddns Instance
This command disables the DDNS.
Syntax
disable
Parameters
None
Example
WS5000.(Cfg).wvpn.ddns> disable
DDNS Settings:
WS5000.(Cfg).wvpn.ddns>
8.69.4 enable
ddns Instance
Enable DDNS.
Syntax
enable
Parameters
none
Example
WS5000.(Cfg).wvpn.ddns> enable
DDNS Settings:
CLI Command Reference 8-335
WS5000.(Cfg).wvpn.ddns>
8.69.5 remove
ddns Instance
Use remove to remove DNS specific attributes.
Syntax
remove <rem_parameter> <value>
rem_parameter:
dnsServerAddr This command removes a DNS Server IP Address from
existing list of addresses. Takes IP Address of DNS
Server to be removed as the value.
dnsReverseZone This command removes a DNS reverse zone.
Parameters
Example
WS5000.(Cfg).wvpn.ddns> remove dnsServerAddr 192.168.1.3
Removing dynamicDnsSettings.deleteDnsAddr....
Status : Success.
DDNS Settings:
WS5000.(Cfg).wvpn.ddns>
8-336 WS 5000 Series System Reference
8.69.6 set
ddns Instance
This command is used to configure DDNS management attributes.
Syntax
set <cfg_parameter> <value>
Parameters
Example
WS5000.(Cfg).wvpn.ddns> set ttl 39
DDNS Settings:
WS5000.(Cfg).wvpn.ddns>
8.69.7 show
ddns Instance
This command is used to view the DDNS setting.
Syntax
show
show ddns
Parameters
Example
WS5000.(Cfg).wvpn.ddns> show ddns
DDNS Settings:
CLI Command Reference 8-337
WS5000.(Cfg).wvpn.ddns>
8.69.8 updateClientDns
ddns Instance
This command is used to update client DNS table.
Syntax
updateClientDns
Parameters
None
Example
WS5000.(Cfg).wvpn.ddns> updateClientDns
DDNS Settings:
WS5000.(Cfg).wvpn.ddns>
8-338 WS 5000 Series System Reference
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.70.1 add
ip pools Instance
This command is used to add IP Address pools.
Syntax
add pool <pool_name> <begin IP> <end IP>
Parameters
Example
WS5000.(Cfg).wvpn.ip_pools> add pool TestPool 192.168.1.10 192.168.1.20
Adding ....
Status : Success.
WVPN IP Pools:
CLI Command Reference 8-339
DHCP Enabled : no
Use DHCP Gateway : no
Available Pools:
1. Default.
2. TestPool.
WS5000.(Cfg).wvpn.ip_pools>
8.70.2 disable
ip pools Instance
This command disable DHCP WVPN service.
Syntax
disable
Parameters
None
Example
WS5000.(Cfg).wvpn.ip_pools> disable
Disabling...
Status : Success.
WVPN IP Pools:
DHCP Enabled : no
Use DHCP Gateway : no
Available Pools:
1. Default.
2. TestPool.
WS5000.(Cfg).wvpn.ip_pools>
8.70.3 enable
ip pools Instance
This command enables the DHCP WVPN service.
Syntax
enable
Parameters
None
Example
WS5000.(Cfg).wvpn.ip_pools> enable
Enabling...
Status : Success.
WVPN IP Pools:
Available Pools:
1. Default.
8-340 WS 5000 Series System Reference
2. TestPool.
WS5000.(Cfg).wvpn.ip_pools>
8.70.4 ip_pools
ip pools Instance
This command issued to select a Pool to configure.
Syntax
ip_pools <pool_name_or_number> [CR]
Parameters
Example
WS5000.(Cfg).wvpn.ip_pools> ip_pools TestPool
WVPN IP Pools:
Name : TestPool
Netmask : 255.255.255.0
DHCP Server Address : 0.0.0.0
Default Gateway : 0.0.0.0
DNS Address : 0.0.0.0
WINS Address : 0.0.0.0
Domain name :
NETBIOS Node type : H-node
Reuse Address Time : 0 seconds
Number of ranges : 1
IP Ranges:
0) 192.168.1.10-192.168.1.20
WS5000.(Cfg).wvpn.ip_pools.[TestPool]>
You need to further configure the ip_pools for setting the DHCP Server Addres,Default Gateway,DNS
Address,WINS Address and Domain name mentioned in the example above. For this you have to enter
the sub context level of ip_pools. You can enter this sub-context level by either entering the ip_pool name or
the index of the ip_pools. The following are the contents of the sub-context of ip_pools:
1. To enter the sub-context of ip_pools
WS5000.(Cfg).wvpn.ip_pools> ip_pools 1
WVPN IP Pools:
Name : TestPool
Netmask : 255.255.255.0
DHCP Server Address : 0.0.0.0
Default Gateway : 0.0.0.0
DNS Address : 0.0.0.0
WINS Address : 0.0.0.0
Domain name :
NETBIOS Node type : H-node
Reuse Address Time : 0 seconds
Number of ranges : 1
IP Ranges:
0) 198.162.1.10-198.162.1.20
WS5000.(Cfg).wvpn.ip_pools.[1]>
CLI Command Reference 8-341
Syntax
set <cfg_parameter> <value>
Parameters
Example
WS5000.(Cfg).wvpn.ip_pools.[1]> set dhcpServer 192.168.1.2
Name : TestPool
Netmask : 255.255.255.0
DHCP Server Address : 192.168.1.2
Default Gateway : 0.0.0.0
DNS Address : 0.0.0.0
WINS Address : 0.0.0.0
Domain name :
NETBIOS Node type : H-node
Reuse Address Time : 0 seconds
Number of ranges : 1
IP Ranges:
0) 198.162.1.10-198.162.1.20
WS5000.(Cfg).wvpn.ip_pools.[1]>
8.70.5 remove
ip pools Instance
This command is used to delete IP pools.
Syntax
remove pool <pool_name>
Parameters
Example
WS5000.(Cfg).wvpn.ip_pools> remove pool TestPool
DHCP Enabled : no
Use DHCP Gateway : no
Available Pools:
1. Default.
WS5000.(Cfg).wvpn.ip_pools>
8.70.6 set
ip pools Instance
This command issued to configure WVPN DHCP.
Syntax
set useDhcpGateway <yes/no> [CR]
Available Pools:
1. Default.
WS5000.(Cfg).wvpn.ip_pools>
8.70.7 show
ip pools Instance
This command is used to display the pool information.
Syntax
show ip_pools Display pool information
CLI Command Reference 8-343
Parameters
Example
WS5000.(Cfg).wvpn.ip_pools> show ip_pools
WVPN IP Pools:
Available Pools:
1. Default.
WS5000.(Cfg).wvpn.ip_pools>
8-344 WS 5000 Series System Reference
8.71 rt Instance
WVPN Context
This context is an instance of WVPN context and is used to view the VPN runtime session information. Table
8.76 summarizes the commands within this context. Common commands between multiple contexts are
described in further detail in the Common Commands
Table 8.76 rt Instance Command Summary
Command Description Ref.
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.71.1 Kill
rt Instance
This command is used to kill VPN sessions.
Syntax
kill<session_id>
Parameters
Example
WS5000.(Cfg).wvpn.rt> kill 1
Session 1:
WS5000.(Cfg).wvpn.rt>
8.71.2 Show
rt Instance
This command is used to view the VPN session and VPN runtime details.
Syntax
Syntax: show [display_parameter]
Parameters
session Displays VPN session details. Provide one of the three values wile using this parameter:
• n— The session number. (show session n)
• ipaddr— The IP address of the session. (show session ipaddr)
• macaddr— The MAC address of the session. (show session mac)
Example
WS5000.(Cfg).wvpn.rt> show
1 VPN sessions
WS5000.(Cfg).wvpn.rt>
Session 1:
WS5000.(Cfg).wvpn.rt>
8-346 WS 5000 Series System Reference
1 VPN sessions
WS5000.(Cfg).wvpn.rt>
CLI Command Reference 8-347
.. or end Terminate a current session and moves up a context, hierarchically. page 8-7
exit Terminate a current session and returns to the “root” prompt. page 8-7
8.72.1 set
wtls Instance
This command is used to configure the security attributes.
Syntax
set <cfg_parameter> <value>
Parameters
Example
WS5000.(Cfg).wvpn.wtls> set customCipher AES256
Configuring WTLS....
Status : Success.
WTLS Settings:
Server number: : 1
Security mode: : customSecurity
Wanted FIPS mode: : Unavailable
Cipher: : AES256
MAC: : SHA_160
Minimum client RSA key size: : 1024 bits
Maximum client RSA key size: : 4096 bits
Minimum RSA key size: : 1024 bits
Maximum RSA key size: : 3072 bits
Handshake timeout: : 0h 1m( 90 secs)
Require client certificates: : false
Key refresh: : 256 packets
WS5000.(Cfg).wvpn.wtls>
Configuring WTLS....
Status : Success.
WTLS Settings:
Server number: : 1
Security mode: : customSecurity
Wanted FIPS mode: : Unavailable
Cipher: : AES256
MAC: : MD5_128
Minimum client RSA key size: : 1024 bits
Maximum client RSA key size: : 4096 bits
Minimum RSA key size: : 1024 bits
Maximum RSA key size: : 3072 bits
Handshake timeout: : 0h 1m( 90 secs)
Require client certificates: : false
Key refresh: : 256 packets
WS5000.(Cfg).wvpn.wtls>
8.72.2 show
wtls Instance
This command issued to view the WTLS general settings.
Syntax
show
show wtls
Parameters
Example
WS5000.(Cfg).wvpn.wtls> show wtls
WTLS Settings:
Server number: : 1
Security mode: : defaultSecurity
Wanted FIPS mode: : Unavailable
Cipher: : AES128
MAC: : SHA_160
Minimum client RSA key size: : 1024 bits
Maximum client RSA key size: : 4096 bits
Minimum RSA key size: : 1024 bits
Maximum RSA key size: : 3072 bits
Handshake timeout: : 0h 1m( 90 secs)
Require client certificates: : false
Key refresh: : 256 packets
WS5000.(Cfg).wvpn.wtls>
8-350 WS 5000 Series System Reference
Service Mode CLI
copy Copy files between the Switch and TFTP/FTP server page 9-8
enablecclog Enable Switch log information to the log file page 9-13
export Exports log files from the Switch to TFTP server. page 9-14
shell Enter into the embedded O.S. command prompt page 9-22
9.2.1 ? or help
Displays a list of available commands. Identical to "help" command.
Syntax
?
Parameters
None
Example
SM-WS5000> ?
System Context.
----------------------------------------------
Commands Brief Description
----------------------------------------------
? or help To get the command information
logout or bye Close this session
exit Exit from the Service CLI mode.
capture Capture the current system status to a file
cleanapdbglog Cleanup AP300 debug log files
clear Clears the screen
configure Configure system attributes
copy Copy files between the Switch and TFTP/FTP server.
debug Enable/disable debug information to the log file
delete Delete an image files from the memory
description Set description text.
diag Diagnostic utility.
directory Display the available image files in memory
emergencymode Enable or disable Emergency Mode
enablecclog Enable Switch log information to the log file
execute CLI Service Mode command file execution
export Exports log files from the Switch to TFTP server.
ftpPasswd Changes password for FTP operations.
getcclogfile Upload Switch log file to TFTP Server
install Install primary/standby/Kerberos config or CLI
commands.
launch Launches the specified program
ledcolor Get or set the color of the LEDs
logdir Display the user saved log files
name Set or change the name.
password Change the CLI Service Mode password
ping Ping a network host/IP address
remove Remove a log file shown by 'logdir' command.
restore Restore system image or configuration.
rfping Send a WNMP ping to a Access Port
save Save the running system configuration to a file.
setThresholds Enable/Disable/Set thresholds for periodic monitoring.
shell Enter into the embedded O.S. command prompt
show Display context specific attributes
showAPFirmware Displays AP Firmware images available.
showBuildInfo Displays build version Information.
showDiskUsage Displays current disk usage.
showHardwareInfo Displays current hardware Information.
showMemUsage Displays current memory usage.
showThresholds Display current settings for various thresholds.
watchdogtimer Enable/disable watch dog timer
wvpnctl Enable/disable wvpn logging
SM-WS5000>
Service Mode CLI 9-5
Logging out...
user name:
9.2.3 exit
Exits the CLI Service Mode and returns to the switch command prompt (normal CLI).
Syntax
exit
Parameters
None
Example
SM-WS5000> exit
Disabling CLI Service Mode commands...... done.
WS5000>
9.2.4 capture
This command saves the current system status (and packets) of various tables, files and processes of the
switch to a file, for use by Symbol engineers during problem resolution. The file name, ssm_report, appears in
the WS5000/scripts/service/ directory. Any previous ssm_report file gets renamed to ssm_report.prev.
After capturing the system status, it can be displayed by using the show sysstat command. Use 'logdir' to list
the captured file names.Similarly, use 'remove' to delete the saved files and 'export' command to copy files to
remote TFTP server.
Syntax
capture <option>
Parameters
Example
SM-WS5000> capture sysstat
SM-WS5000>
9.2.5 cleanapdbglog
This command is used to clean up AP300 debug log files.
Syntax
cleanapdbglog
Parameters
None
Example
This command does not generate any output.
9.2.6 clear
Clears the screen contents and returns to the service mode prompt.
Syntax
clear
Parameters
None
Example
SM-WS5000> clear
SM-WS5000>
9.2.7 configure
The command changes the Service Mode CLI to the Service Mode “Configuration” context, allowing the
administrator to configure system attributes within the Service Mode. The sub-contexts and related commands
available in the normal System Context (WS5000> prompt) are the same.
Syntax
configure
Parameters
None
Example
SM-WS5000> configure
SM-WS5000.(Cfg)> ?
Config Context.
----------------------------------------------
Commands Brief Description
----------------------------------------------
Service Mode CLI 9-7
SM-WS5000.(Cfg)>
9.2.8 copy
Copies a file (system image (*.img) or configuration file (*.cfg) from the WS5000 to a (T)FTP server, or vice
versa. TFTP can be used to transfer *.sys.img, *.cfg, and *.sym files. FTP can be used to transfer .krb,
.sys.img, .cfg, and .sym files.
The following are the default modes:
• Default protocol is TFTP
• Default user for FTP: anonymous
• Default mode for FTP: binary.
If using FTP, and the user is not anonymous (using -u option), CLI prompts the user to enter password.
IMPORTANT! DO NOT USE THIS COMMAND FOR FILES LARGER THAN 32MB.
Syntax
copy <source> <destination> [-u user] [-m mode]
Parameters
Example
SM-WS5000> copy tftp system
Enter the file name to be copied from TFTP server : backup.sys.img
IP address of the TFTP server : 157.235.208.208
9.2.9 debug
Allows enabling or disabling logging of debug messages in the debug log file. User must execute the debug
command to see the log of the operating function. Entering a specific option displays the debug option that is
enabled.
Syntax
debug [<option> <enable/disable>]
Parameters
Example
SM-WS5000> debug sharedmem enable
SM-WS5000>
9.2.10 delete
Deletes the specified image or config file from the WS5000. As a shortcut, “del” can be used instead of
“delete”. Use the directory command to list the files that can be deleted.
Syntax
delete <file_name>
Parameters
Example
SM-WS5000> directory
Date & Time Bytes File Name
SM-WS5000>
9.2.11 description
Sets the description to the policy or item in the selected context.
Syntax
description <description_text>
Parameters
Example
SM-WS5000> description WS5000 Wireless Network
Adding description...
Status : Success.
System information...
SM-WS5000>
9-12 WS5000 Series Switch System Reference
9.2.12 diag
Use diag to create a text file for memory dump of different data structures. It dumps all the information related
to the object in /logfile which can be viewed using the root permission.This command is to be used by an admin
with a root permission (access to the shell).
The output file will be saved in logs dir which can be viewed using 'logdir' command.
Syntax
diag <obj_name> <file_name> <user_name>
Parameters
obj_name <obj_name>={inQ|outQ|muo|bfio|ALT|cgo|ceo|mco|po}
Name of object whose memory dump is required. It can be either of the following:
• inQ=Input Q.
• outQ=Output Q.
• muo=MU Object.
• bfio=Interface Object (both NIC and AP).
• ALT=Address Lookup Table.
• cgo=CG Object.
• ceo=CE Object.
• mco=MC Object.
• po=Policy Object.
file_name Name of file where the output needs to be saved.
user_name Name of user executing the command.
Example
SM-WS5000> diag ALT TestFile admin
SM-WS5000> logdir
File Name Bytes Date & time
========================================================
SM-WS5000>
9.2.13 directory
Lists the image and configuration files that are stored on a WS5000. As a shortcut, “dir” can be used instead
of “directory”.
Syntax
directory
Parameters
None
Service Mode CLI 9-13
Example
SM-WS5000> directory
Date & Time Bytes File Name
SM-WS5000>
9.2.14 emergencymode
Enables or disables the “Emergency” Switch Policy (ESP). This is a switch policy that can activated (enabled)
at any time in case of an emergency. When ESP is deactivated (disabled), the previous switch policy is
reactivated.
Define an Emergency switch Policy prior to enabling the Emergency Wireless Switch Policy. Create two or
more switch policies. An error message displays if less than two Switch Policies are available.
Syntax
emergencymode <enable/disable>
Parameters
Example
SM-WS5000> emergencyMode enable
9.2.15 enablecclog
This command is used to enable the CC log with dd.conf input file.
Syntax
enablecclog
Parameters
None
Example
9.2.16 execute
Executes the specified file. The command is used with specified optimization (patch file) files provided from
Symbol Technologies when a service upgrade is needed on the WS5000 Series Switch.
9-14 WS5000 Series Switch System Reference
Syntax
execute
Parameters
None
Example
SM-WS5000> execute
Executing CLI Service Mode command file....
Enter the command file name:
9.2.17 export
This command is used to copy the log files from the switch to the remote TFTP server. use ‘logdir’ to view the
list of user log files that can be exported.
Syntax
export
Parameters
This is an interactive command and you will be asked for the following:
• destination — This is the remote TFTP host.
• filename — The name of the log file that has to be exported to the remote TFTP server.
• username — Enter the user name which you mentioned at the time of log file creation when using the
‘diag’ command. The default user name would is admin.
Example
SM-WS5000> logdir
File Name Bytes Date & time
========================================================
SM-WS5000> export
Creating the Event list...
Enter the log file name : TestBfio.bfio.diag
Enter the user name : admin
IP address of the remote TFTP server : 192.168.168.10
Optional storage path in the TFTP server (press ENTER if none) :
SM-WS5000>
9.2.18 ftpPasswd
This command is used to reset the FTP password for the switch.
This command is used to change the password of the standard user for FTP operations. The default user name
is — ftpuser. You have to use the default user name to FTP to the switch along with the password that you
provide using ftpPasswd.
Service Mode CLI 9-15
Syntax
ftpPasswd
Parameters
None
Example
SM-WS5000> ftpPasswd
SM-WS5000>
9.2.19 getcclogfile
This command is used to upload the CC log file to the TFTP server.
Syntax
getcclogfile
Parameters
None
Example
SM-WS5000> getcclogfile
SM-WS5000>
9.2.20 install
Configures the switch as primary or standby, installs Kerberos settings, or runs a CLI command file, depending
on the value of the first parameter.
Syntax
install <install_option> [file_name]
Parameters
install_option Specify Primary or Standby to configure the switch as the primary or standby
Switch.Specify which command (.sym) file to install. Omitting a specific
command file, forces the system to install the default command *.sym file. If no
default command file exits, omitting the file name results in no changes to the
current configuration.
file_name The optional command file name extensions are (.sym) or Kerberos file (.krb) to
install. Specifying a valid command file (*.sym) causes the switch to shutdown
and reset. Specifying a valid Kerberos file to update (*.krb) does not require the
Kerberos enabled switches to reset.
9-16 WS5000 Series Switch System Reference
Example
SM-WS5000> install primary test.sym
SM-WS5000>
9.2.21 launch
Use launch to specify the program or shell command to be executed. Observe the following constraints:
• For executing a Linux program, its path must be available in the environment variable $PATH.
• When executing a command, the command must be available in the /WS5000/scripts/engg directory
with executable permission.
Syntax
launch -p <key> <option> <program_name>
Parameters
Example
SM-WS5000> cfg encrypt B20!FlyIn
SM-WS5000.(Cfg)>
9.2.22 ledcolor
This command is not supported in WS5000 hardware platform.
Syntax
None
Parameters
None
Example
None
9.2.23 logdir
This command is used to lists available user log (history, syslog, pktlog, diag log, system status log) files. It
does not list image/config files. Use dir command to list image/config files.
Syntax
logdir
OR
logdir user <username>
Parameters
Example
WS5000.(Cfg)> ..
WS5000> service
Enter CLI Service Mode password: ********
Enabling CLI Service Mode commands...... done.
SM-WS5000> cfg
SM-WS5000.(Cfg)> logdir
9.2.24 name
This command is used to change the systems name.
Syntax
name <name>
Parameters
Example
SM-WS5000> name Bangalore_WS5000
Configuring name...
Status : Success.
9.2.25 password
This command is used to change the CLI Service Mode password.
Syntax
password
Parameters
None
Example
SM-WS5000> password
SM-WS5000>
9.2.26 ping
Sends ICMP ECHO_REQUEST packets to a network host.
Service Mode CLI 9-19
Syntax
ping <host/ip_address>
Options:
ping [-Rdfnqrv] [-c count] [-i wait] [-l preload] [-p pattern]
[-s packetsize] host
Parameters
Example
SM-WS5000> ping WS5000
PING WS5000 (10.1.1.101) from 10.1.1.101 : 56(84) bytes of data.
64 bytes from WS5000 (10.1.1.101): icmp_seq=1 ttl=64 time=0.074 ms
64 bytes from WS5000 (10.1.1.101): icmp_seq=2 ttl=64 time=0.027 ms
64 bytes from WS5000 (10.1.1.101): icmp_seq=3 ttl=64 time=0.031 ms
64 bytes from WS5000 (10.1.1.101): icmp_seq=4 ttl=64 time=0.032 ms
SM-WS5000>
9.2.27 remove
This command is used to remove specified log (history, packet, diag log, sysstatus) file. It does not remove
image/config or local syslog files.To remove image/config files use 'delete'. To remove local syslog files use
‘remlocal’.
Syntax
remove <file_name> [username-optional]
Parameters
Example
WS5000.cfg>logdir
9.2.28 restore
This command is used to restore system images and configuration. This command will reset the system and
boot up with the new restored image/config.
Syntax
restore <restore_option> <file_name>
Parameters
Example
SM-WS5000> restore configuration kp.cfg
This command will reset the system and boot up with the new configuration.
9.2.29 rfping
This command is used to ping to the Access Port. You need to enter the Access Port MAC address to ping.
Syntax
rfping <mac address> [<count>]
Parameters
mac_address The MAC address of the Access Port to which you want to ping.
count The number of ping attempts to be made
Example
SM-WS5000> rfping 00:A0:F8:B5:59:1E 4
SM-WS5000>
9.2.30 save
This command is used to save the running system configuration to a file.
Syntax
save <save_option> [nocertificate] <file_name>
Parameters
Example
SM-WS5000> save config TestConfig
SM-WS5000>
9.2.31 setThresholds
This command is used to set/clear thresholds for monitoring.Whenever any of the cpu/mem/disk usage goes
above the specified threshold percent value, an alert is sent. As long as the usage remains above this
threshold, no more alerts are sent. When the usage goes down and subsequently, this threshold is crossed, an
alert will be sent again, and so on.
Please enable monitoring using 'set monitor' command before using this command.
Specify zero value to disable corresponding threshold monitoring.
Syntax
setThresholds [-c <nn>] [-m <nn>] [-d <nn>]
Parameters
-c <nn> Add syslog when cpu usage percent goes above <nn>.
-d <nn> Add syslog when disk usage percent goes above <nn>.
-m <nn> Add syslog when memory usage percent goes above <nn>.
Example
SM-WS5000> setThresholds -c 95
9.2.32 shell
This command is used to enter into the embedded OS Command prompt and environment.
Syntax
shell
Parameters
None
Service Mode CLI 9-23
Example
SM-WS5000> shell
SM-WS5000>
9.2.33 show
Displays a list of details about the WS5000 system related to the chosen display_parameter.
Syntax
show <display_parameter>
Parameters
Example
SM-WS5000> show accessports
SM-WS5000>
9.2.34 showAPFirmware
This command is used to show Access Port image information.
Syntax
showAPFirmware
Parameters
None
Example
SM-WS5000> showAPFirmware
SM-WS5000>
9.2.35 showBuildInfo
This command is used to show current build information.
Syntax
showBuildInfo
Parameters
None
9-26 WS5000 Series Switch System Reference
Example
SM-WS5000> showBuildInfo
9.2.36 showDiskUsage
This command is used to show current disk usage.
Syntax
showDiskUsage
Parameters
None
Example
SM-WS5000> showDiskUsage
SM-WS5000>
9.2.37 showHardwareInfo
This command is used to view the hardware information of the switch.
Syntax
showHardwareInfo
Parameters
None
Service Mode CLI 9-27
Example
SM-WS5000> showHardwareInfo
SM-WS5000>
9.2.38 showMemUsage
This command is used to view the current memory usage.
Syntax
showMemUsage
Parameters
None
Example
SM-WS5000> showMemUsage
total: used: free: shared: buffers: cached:
Mem: 395223040 135512064 259710976 0 8073216 55934976
Swap: 0 0 0
MemTotal: 385960 kB
MemFree: 253624 kB
MemShared: 0 kB
Buffers: 7884 kB
Cached: 54624 kB
SwapCached: 0 kB
Active: 27048 kB
Inactive: 48424 kB
HighTotal: 0 kB
HighFree: 0 kB
LowTotal: 385960 kB
LowFree: 253624 kB
SwapTotal: 0 kB
SwapFree: 0 kB
Committed_AS: 63244 kB
VmallocTotal: 647148 kB
VmallocUsed: 44596 kB
VmallocChunk: 602552 kB
SM-WS5000>
9.2.39 showThresholds
This command is used to view current values of various thresholds for monitoring.
Syntax
showThresholds
Parameters
None
9-28 WS5000 Series Switch System Reference
Example
SM-WS5000> showThresholds
SM-WS5000>
9.2.40 watchdogtimer
This command is used t oeither enable or disable the watch dog timer.
Syntax
watchdogtimer <enable/disable>
Parameters
Example
SM-WS5000> watchdogtimer enable
SM-WS5000>
9.2.41 wvpnctl
This command is used to configure wvpn server logging.
Syntax
wvpnctl enable [flags=<flags>] [size=<size>] [filename=<name>]
or
wvpnctl disable
Parameters
Example
SM-WS5000> wvpnctl enable size=1024 filename=/image/Testwvpn
SM-WS5000>
If the switch has crashed for some reason, then a file called Fault.dmp will be generated in /CC folder. This
contains the trace of the stack at the time the switch was crashed.
The switch administrator can send the logs/Fault.dmp to the engineering team using the standard ftp/tftp
command.
9-30 WS5000 Series Switch System Reference
Use this table to determine the correct power settings for International use when using external antennas with
the AP 100 802.11b Access Port, Model CCRF-5020-10-WW.
Note For US (FCC), all Symbol Technologies, certified antennas can be used on the
maximum power level setting.
Table 10.1 International Antenna and Power Settings for AP 100 802.11b Access Port
Antenna Model Max Power Setting Antenna Type Comments
ML-2499-APA2-01 1 Dipole
Table 10.1 International Antenna and Power Settings for AP 100 802.11b Access Port (Continued)
Antenna Model Max Power Setting Antenna Type Comments
ML-2499-BPDA1-01 5 Heavy Duty 10° Directional Use with 100ft cable ML-1499-100JK-01
High Gain Parabolic Dish
Use this table to determine the correct European Union power settings for the AP 200 802.11a/b Access Port,
Model CCRF-5030-100-WW (external antenna 802.11a radio only), CCRF-5030-200-WW (external antenna
802.11a/b radio), CCRF-5030-210-WW.
Use this table to determine the correct Japanese power settings for the AP 200 802.11a/b Access Port, Model
Table 10.2 European Union and Japanese Antenna and Power Settings for The AP 200 802.11a/b Access Port
Additional Cable Length in Feet
Antenna Model Antenna Type/Pattern Max Authorized Power Settings
ML-2499-APA2-01 Flexible Rubber Dipole Omni-Directional Any Any Any Any Any Any
ML-2499-HPA3-01 Hi-gain Dipole Omni-directional Any Any Any Any Any Any
ML-2499-PNAHD-01 Hi-gain in/outdoor Panel Directional Any Any Any Any Any Any
Antennas and Power 10-3
Table 10.2 European Union and Japanese Antenna and Power Settings for The AP 200 802.11a/b Access Port (Con-
Additional Cable Length in Feet
Antenna Model Antenna Type/Pattern Max Authorized Power Settings
ML-2499-BMMA1-01 Hi-gain in/outdoor Dipole Omni- Any Any Any Any Any Any
Directional
ML-2499-SDD1-01 Patch w/diversity Omni-Directional Any Any Any Any Any Any
Internal Antenna Omni Directional Any Any Any Any Any Any
5 GHz
Table 10.3 CCRF-5030-100-WW (external antenna 802.11a radio only), CCRF-5030-200-WW (external antenna
802.11a/b radio), CCRF-5030-210-WW
Additional Cable Length in Feet
Antenna Model Antenna Type/Pattern Max Authorized Power Settings
ML-2499-APA2-01 Flexible Rubber Dipole Omni-Directional Any Any Any Any Any Any
ML-2499-HPA3-01 Hi-gain Dipole Omni-directional Any Any Any Any Any Any
ML-2499-PNAHD-01 Hi-gain in/outdoor Panel Directional Any Any Any Any Any Any
Table 10.3 CCRF-5030-100-WW (external antenna 802.11a radio only), CCRF-5030-200-WW (external antenna
802.11a/b radio), CCRF-5030-210-WW (Continued)
Additional Cable Length in Feet
Antenna Model Antenna Type/Pattern Max Authorized Power Settings
ML-2499-SDD1-01 Patch w/diversity Omni-Directional Any Any Any Any Any Any
Internal Antenna Omni Directional Any N/A N/A N/A N/A N/A
5 GHz
Use this table to determine the correct United States power settings for the AP 200 802.11a/b Access Port,
Model CCRF-5030-100-WW (external antenna 802.11a radio only), CCRF-5030-200-WW (external antenna
802.11a/b radio), CCRF-5030-210-WW.
Note All Symbol Technologies certified antennas can be used on the maximum power
level setting.
Table 10.4 United States Antenna and Power Settings for the AP 200 802.11a/b Access Port
Additional Cable Length in Feet
Antenna Model Antenna Type/Pattern Max Authorized Power Settings
Table 10.4 United States Antenna and Power Settings for the AP 200 802.11a/b Access Port (Continued)
Additional Cable Length in Feet
Antenna Model Antenna Type/Pattern Max Authorized Power Settings
ML-2499-BMMA1-01 Hi-gain in/outdoor Dipole Omni- 2, 3, Any Any Any Any Any
Directional 4, 5
ML-2499-BPDA1-01 Outdoor Parabolic Dish Directional None None None None None None
Internal Antenna Omni Directional Any N/A N/A N/A N/A N/A
5 GHz
You can convert the Symbol AP-4131 model access point to RF Ports for use with the WS5000. The port
conversion enables existing customers to utilize an existing Symbol wireless infrastructure with the WS5000
Series Switch.
A converted AP-4131 is one of the many different types of AP's that can be adopted, configured and monitored
by WS5000. After the conversion, the AP-4131 becomes a thin AP responsible for receiving and transmitting
wireless data. All other functionality (such as 802.11 management, security, and packet switching) is
performed by the switch.
The WS5000 CDROM contains an installation package with new firmware image files for AP-4131:
• ap-4131.bin.img
• ap-4131-revert.bin.img
The WS5000 CDROM also includes the following file used for the initial AP-4131 port conversion:
• ap-4131.bin
11-2 WS5000 Series Switch System Reference
Note SNMP traps or Syslog messages are not defined for AP-4131 port conversion
support.
11.2.1 Updating the Access Point Firmware Using the TFTP Program
To update the access point using the TFTP program:
1. Change the firmware filename to ap-413X.bin in the Alter Filename(s)/HELP URL/TFTP Server
section.
2. Change the TFTP server IP address to point to your TFTP server.
3. Select Firmware from the Use TFTP to update Access Points: section and press the enter key.
You can also update the firmware using the TFTP program by configuring the AP4131 applet. The default login
and password (both case-sensitive) for the AP4131 applet are:
Username: admin
Password: Symbol
A Virtual Private Network or VPN is a protected network connection that tunnels through an unprotected
connection. The WS5100-VPN uses a VPN connection to protect wireless transmissions on the untrusted side
of the switch.
The VPN functionary includes the following:
• On Board VPN server
• Firewall
• Network Address Translation (NAT)
This chapter also includes
• VPN Session Setup
12-2 WS5000 Series Switch System Reference
Note You can configure the internal DHCP server on the box to provide public IP
addresses to VPN clients. The server uses relay to transfer virtual IP addresses to VPN
clients.
A device on the untrusted side of the network receives a public IP address from the onboard DHCP server. After
the server authenticates the device, it retrieves a virtual IP address using DHCP relay from the external DHCP
server or from the VPN DHCP server. When the device sends and receives packets, the virtual IP address is
“wrapped around” the public address to enforce secure transmission.See Configuring DHCP Server using CLI
in Chapter 1, WS5000 Series Switch Overview.
WS 5100-V P N
Eth1 Eth2
P OE
AP 100
Internet
Wireles s
C lients
C omputer
LAN WL A N
Trusted Network
Untrusted Network
2. Set the DHCP IP address as the External DHCP server's IP (where you want to relay the DHCP req)
12-4 WS5000 Series Switch System Reference
This CLI command sends an updateClientDns request to the AirBeam Safe VPN Server to send
new updates to the DNS server for all clients that are currently established to the AirBeam Safe
Server.
WS5000>configure WVPN DDNS
WS5000.(Cfg).WVPN.DDNS>set clearClientDns
This CLI command sends a clearClientDns request to the AirBeam Safe Server to send delete operation
for all clients that are currently established to the AirBeam Safe Server.
3. Add/Remove DNS Server address
• Add a DNS Server ip address
WS5000>Configure WVPN DDNS
WS5000.(Cfg).WVPN.DDNS>add DnsServerAddr < ip>
This CLI command adds a DNS Server address to the existing list of DNS Server addresses.
• Remove a DNS Server ip address
WS5000>Configure WVPN DDNS
WS5000.(Cfg). WVPN. DDNS>remove DnsServerAddr <ip>
This CLI command removes an existing DNS Server address from current list of DNS Server
addresses.
Configuring the WS5100 WTLS VPN 12-5
12.2.3 Certificates
Certificates are security credentials that allow network users to prove their identity. A certificate includes the
owner's public key, the expiration date of the certificate, the owner's name and other information about the
public key owner. The verification of these items is done through a Certificate Authority (CA). A CA is a
company that’s set up to generate individual certificates to requestors upon verification of proof of identity.
The WS5100-VPN requires the following types of certificates:
• A CA certificate that’s used to authenticate the certificate issuer.
• A PKCS12 server certificate, issued by a Certificate Authority.
Both certificates must be made available to the WS5100-VPN by copying them to a switch-accessible TFTP
server.
In addition, the Symbol AirBEAM VPN Client must be loaded on all Mobile Units requesting VPN services,
AirBEAM Client is used to download the certificate to the device.
Note VPN server supports both, internal and external, RADIUS server authentication.
The RADIUS server database can be either Local or LDAP.
Table 12.1 lists and describes the CLI commands used to configure simple authentication server settings:
The primary and secondary RADIUS servers can be set using either of the following commands in CLI.
WS5000.(CFG).wvpn.auth.wvpnradius>set ?
set <primary/secondary> host <name/IP> [port] [timeout] [retry] [userpwd]
or
Configuring the WS5100 WTLS VPN 12-7
Table 12.2 describes how to configure the server by settings the parameters for each RADIUS server. The VPN
server supports any number of servers:
Note To use on-board RADIUS server to authenticate the VPN clients, set any of the
switch interface IP address as the RADIUS IP address (in the configuration above).
Note Some servers require the password attribute to be a non empty string.If this value
is set, this string will be used as password. This password is usually left blank to ensure
that different RADIUS users are authenticated.
Node type can be: H-node, B-node, P-node, & M-node. H-node is the
default
set IP Pool domain name WS5000.(Cfg).wvpn.pool[pool name] >set domain
<domain name>
set IP Pool DHCP Lease Time WS5000.(Cfg).wvpn.pool[pool name] >set dhcpLeaseTime
< duration in seconds>
add a range to an existing pool WS5000.(Cfg).wvpn.pool[pool name] >add range
<begin IP> <end IP>
remove a range from an existing WS5000.(Cfg).wvpn.pool[pool name] >remove range
<begin IP> <end IP>
pool
OR
WS5000.(Cfg).wvpn.pool[pool name] >remove rangeIndex
<index number>
This IP address reuse time is used only when all pool ranges are exhausted.
Once pool is depleted and a new request is made for an address, the current
list of active IP addresses are checked to see how long they are idle. Those
IP addresses that are greater than this reuse time are reallocated and
handed out to the new client.
Configuring the WS5100 WTLS VPN 12-9
The license key is decrypted to yield two items-a MAC address, which must match the switch being configured
and the number of VPN sessions to allow.
Note A site license will have a customer-specific code embedded into the MAC
address field; in this case the MAC address value will not be a valid address for any
Ethernet device anywhere. This license entitlement will be meant for use by any and all
switches owned by the customer.
Key sizes available: 512, 768, 1024, 1536, 2048, 3072, 4096, 7680, 15360
configure the ClientRsaKeySize WS5000.(Cfg).wvpn.wtls > set minClientKey <Integer
value>
minimum value
Key sizes available:512, 768, 1024, 1536, 2048, 3072, 4096, 7680,
15360
Key sizes available: 512, 768, 1024, 1536, 2048, 3072, 4096, 7680,
15360
Configuring the WS5100 WTLS VPN 12-13
Key sizes available: 512, 768, 1024, 1536, 2048, 3072, 4096, 7680,
15360
To Use
set VPN support status set vpnsupport enable <license file> [CR]
set vpnsupport disable [CR]
WS5000.(Cfg)> set vpnsupport enable
This command will reset the system.
Are you sure (yes/no) : yes
set up a new WLAN WS5000.(Cfg)>wlan add SampleWlan SampleEssid
To Use
setup Security Policy Create a new security policy SampleSecurity and assign it to SampleWlan.
WS5000.(Cfg)>securitypol
WS5000.(Cfg).SecurityPolicy> add SampleSecurity
Go to Wlan context
WS5000.(Cfg).WLAN.[ SampleWlan]> set security
SampleSecurity
WS5000.(Cfg)> wvpn
WS5000.(Cfg).wvpn> cert
WS5000.(Cfg).wvpn.cert> import /image/caCert cacert.cer
WS5000.(Cfg).wvpn.cert> import serverCert ?
import serverCert <server_pkcs12_key_file> <password> [<server_cert_file>]
Note File names must always be accompanied by directory path. For example: /
certs/ca.cer
To Use
setup the Authentication WS5000.(Cfg)> wvpn auth
WS5000.(Cfg).wvpn.auth> simple
WS5000.(Cfg).wvpn.auth.simpleAuth> set
simpleUser test
WS5000.(Cfg).wvpn.auth.simpleAuth> set
simplePassword test
WS5000.(Cfg).wvpn.auth.simpleAuth> set
simpleDomain test
Configuring IP Pools and the DHCP WS5000.(Cfg)> wvpn ip_pools
WS5000.(Cfg).wvpn.ip_pools> add pool default
server for WVPN. 192.168.4.70 192.168.4.90
WS5000.(Cfg).wvpn.ip_pools> default
WS5000.(Cfg).wvpn.ip_pools.[default]> set
dhcpServer 10.1.1.101
WS5000.(Cfg).wvpn.ip_pools.[default]> set
defaultGateway 10.1.1.101
WS5000.(Cfg).wvpn.ip_pools.[default]> set dns
1.1.1.1
Make sure you have atleast one ip_pool with name default.
Note The above setup—Configuring IP Pools and the DHCP server for WVPN, is based
on an onboard VPN DHCP server. The configuration for using an extrernal/corporate
DHCP server is same except you need to provide the IP, defaultGateway and DNS of the
external DHCP server
WS5000.(Cfg).wvpn> enable
The expected output of this command is
Enabling...
Status : Success.
WVPN Management:
WVPN available : true
WVPN Status : Started
WVPN Server Address : 10.1.1.101 / 10.0.1.73
WVPN Server Port : 9102
WVPN Unused session timeout : 48h 0m (172800 secs)
WVPN Debug level : Debug Info Disabled
WVPN DOS Support : no
WVPN DOS Port : 9103
WVPN Client keep alive : 10 seconds
WVPN Maximum VPN Licenses : 250
WVPN Currently In-Use VPN Licenses : 0
WVPN License Type : Evaluation version,Total eval days 30,Eval days left
30
12.3.6 TroubleShooting
Problem: 1 The Access Ports are not adopted
Possible Reasons:
1. You don't have a valid license key.
2. The country code in the switchpolicy is not set.
3. The MAC address corresponding to the Access Port is in the access port deny list of the switchpolicy.
4. Default action for the switchpolicy is deny.
Problem: 2 Show mu command does not show the hand-held in the list of mobile units although the
hand-held shows it is connected.
Possible Reasons:
1. Hand-held is not associated with the essid of the switch. It is associated with some other essid. In this
case make sure you associate with the essid of the switch
Problem: 3 Show mu command shows the hand-held in the list of mobile units but the ip address of the
hand-held is 0.0.0.0 or 169.x.x.x
Possible Reasons:
1. DHCP server is not running on the Ethernet interface 1 of the switch. Enable the DHCP server on the
switch.
2. IP Pool Range is not set for the DHCP server on Ethernet interface 1.
3. Etherpolicy is not configured properly on the switch. Make sure you have followed all the steps for
creating new etherpolicy and associating it with the active switch policy.
4. Hand-held is not configured properly. Make sure if encryption is used on the switch then the hand-held
has proper encryption settings. This can be done by editing the profile for current essid in Mobile
Companion and setting the correct encryption key.
Problem: 4 Hand-held gets a IP Address but Airbeam safe fails to connect to the VPN server
Possible Reasons:
1. VPN server address is not set properly in the Airbeam safe. This can be done by setting the Host value
in the Airbeam safe to the IP address of the Ethernet 1.
2. Default ip pool is not present in the switch. Make sure you create a "default" ip pool and set the DNS
and DefaultGetway entries for this pool.
3. ip_pool has dhcp server enabled.
4. Certificates are not properly installed on the switch. Install both client and server certificates on the
client.
5. CA Certificates are not installed on the hand-held. Install the proper certificates on the hand-held.
Configuring the WS5100 WTLS VPN 12-19
6. The date settings of the hand-held are not current. Change the date setting of the hand-held to the
current dates.
Problem: 5 Hand-held looses ip address after some time. It shows 0.0.0.0 as IP address on renewing
the ip address.
Possible Reasons:
1. Try warm-booting the hand-held. This may be because of the problem in the hand-helds.
12.4 Firewall
WS5000, with the introduction of VPN services, acts as a device at the boundary between a public and a
private network. As such it must act not only as an encryption/decryption point but also as a gateway and a
firewall between two networks.Hence Firewall and Port Filter functionality is required, which can filter the
traffic based on a configured list of hosts. It also provides selective enable/disable of web (http or https), telnet
and ftp on the management interface.
WS5000 acts as gateway and a firewall between public and a private network in the below pattern:
• Public: Un-Trusted LAN
• Private: Trusted LAN
WS5000 provides limited stateless firewall functionality for a configurable list of peers on private and public
networks. Firewall filtering is based on the existing packet classification engine. Part of the existing packet
classification functionality allows the traffic that matches classifiers to be allowed or denied. Same
functionality is used to implement firewall filtering.
Following are the different policies applied for the packets from different type of hosts:
1. LAN 1 - This LAN object refers to all the clients configured on Ethernet 1 (ep =1 by default).
2. LAN 2 - This LAN object refers to all the wired clients (Non VPN)configured on Ethernet 2 (ep =2 by
default).
3. LAN_VPN - This LAN object refers to wired VPN clients (ep = 3, refers to virtual interface for VPN
clients).IN policy is applied before the packets from the private LAN are forwarded from the Packet
Switch to the VPN server.OUT policy is applied to the packets as the VPN server sends them to the
private LAN.
The filters can applied in any of the LAN context by attaching a network policy to the LAN object.
Filters for MU with or without VPN are applied by attaching Network Policy to the WLAN object in the appolicy
context.
4. Wired hosts without VPN - Filtering uses IN and OUT policies that are associated with a LAN
configuration object.
Note You can create any number of LAN objects but at any given instance only LAN
object can be associated with a particular Ethernet port.
Table 12.9 lists and describes the CLI commands used to manage firewall in WS5000:
12-20 WS5000 Series Switch System Reference
To CLI command
enter firewall context WS5000.(Cfg)> fw
add port filter configuration to lan3 WS5000.(Cfg).Fw> addpf lan3 allow web
Access ports send out beacons at periodic intervals. By default, access ports send out one beacon frame every
100 milli-seconds. If more than one Access Port is connected to the WS5000 switch and all such Access Ports
are adopted, each Access Port will receive beacons from their neighboring access ports. These beacon frames
are passed to the WS5000 Switch.
The switch maintains a table, on a adopted AP - found AP basis, along with other information like the signal
strengths etc. Also, the switch maintains a similar table for the APs detected by an associated Mobile Unit.
(Only Symbol Mobile Units support this).
The following are the details of the two tables, accessible through SNMP:
13.1 ccPortalBeaconRptTable
This table describes the identification information and the signal values (in dBm) of beacons heard from
other Portals.
This table is indexed on
a. ccRapResultsRogueIndex
13-2 WS5000 Series Switch System Reference
b. ccPortalBeaconRptPortalIndex
Table 13.1 ccPortalBeaconRptTable
13.2 ccMuProbeRptTable
This table reports the AP’s detected by a Mobile Unit. It has information on the signal strength and when
the Mobile Unit last heard from the AP. It is indexed on
a. ccMuMac
b. ccPortalIndex
Table 13.2 ccMuProbeRptTable
Enhanced RF Stats is a feature to monitor the RF environment of the wireless switch system. RF stats includes
an extensive set of RF parameters which are maintained by the wireless switch which are sourced from the
data packets and the WISP packets that are transmitted to and from the switch. All the statistics are gathered
at runtime and none of these parameters are persistent. Hence on a reboot all these parameters are reset. The
system provides only an SNMP interface to query the parameters. All the parameters are read-only. The
parameters include AP, Radio and MU statistics. Each of Radio and MU in-turn have Static, Raw and Derived
parameters which are grouped based on type. For the AP, only the static parameters are supported. The
description of the SNMP tables and their contents is as below.
This chapter also describes how enhanced RF Statistics can be used to detect common wireless networking
problems in Explanation of Enhanced RF Statisitcs on page 14-32
14.1 ccApTable
DESCRIPTION: This table contains general information related to an AP. It holds details regarding the APs
connected to the switch and all their packet information. It identifies all access ports and their radios, (called
“Portals”) associated with the wireless switch.
14-2 WS5000 Series Switch System Reference Guide
INDEXED ON:ccApIndex
14.2 ccPortal
14.2.1 ccPortalTable
DESCRIPTION: It contains all the general information related to each portal. It indentifies all access ports and
their radios (called “Portals”) associated with the wireless switch.
The ccPortalTable lists all radios (“Portals”) currently adopted by the wireless switch.
INDEXED ON:ccPortalIndex
14.2.3 ccPortalLastReason
Field Type Description
ccPortalLastReason Integer This value indicates the reason for the most-
recent portal UnAdoption or Denial.
14.2.4 ccPortalSystemStatsTable
DESCRIPTION: The table contains statistics related to the management packets sent/received by each portal
INDEXED ON: ccPortalIndex
14.2.5 ccPortalStatsTable
DESCRIPTION: This table describes general statistics about data packets sent/received through each portal on
the switch.
INDEXED ON: ccPortalIndex
14.2.6 ccPortalRxPktsTable
DESCRIPTION: This table gives the statistics of the packets received by a portal at various rates.
INDEXED ON: ccPortalIndex
14.2.7 ccPortalTxPktsTable
DESCRIPTION: This table gives the statistics of the packets transmitted by a portal at various rates.
Enhanced RF Statistics 14-7
14.2.8 ccPortalRxOctetsTable
DESCRIPTION: This table gives the statistics of the number of octets received by a portal at various rates.
INDEXED ON: ccPortalIndex
14.2.9 ccPortalTxOctetsTable
DESCRIPTION: This table gives the statistics of the number of octes transmitted by a portal at various rates.
INDEXED ON: ccPortalIndex
14.2.10 ccPortalTxRetriesPktsTable
DESCRIPTION: This table gives the statistics of the number of retries for the packets transmitted by a portal.
INDEXED ON: ccPortalIndex
14.2.11 ccPortalTxRetriesOctetsTable
DESCRIPTION: This table gives the statistics of the number of retries w.r.t the octets transmitted by the portal.
INDEXED ON: ccPortalIndex
14.2.12 ccPortalSigStatsTable
DESCRIPTION: This table gives statistics about RSSI, Signal, Noise, and SNR for packets received by a portal.
INDEXED ON: ccPortalIndex
Note This
normally is a
negative value
ranging from -
10dBm to -80dBm. It is
possible for this value to be
positive, but that would be
rare, and would signal an
exceptionally strong signal.
14.2.13 ccPortalSumStatsShortTable
DESCRIPTION: This table contains the derived statistics calculated over 30 seconds window for each portal.
14-14 WS5000 Series Switch System Reference Guide
14.2.14 ccPortalSumStatsLongTable
DESCRIPTION: The derived statistics calculated over 1 hour window for each portal.
INDEXED ON: ccPortalIndex
14.3 ccMus
14.3.1 ccMuInfoTable
DESCRIPTION: This table describes general information about each MU associated to the switch/AP.
INDEXED ON: ccMuMac
14.3.2 ccMuStatsTable
DESCRIPTION: It contains the number of data packets received form/transmitted to a MU which includes
unicast, non unicast and undecryptable packets
INDEXED ON: ccMuMac
14.3.3 ccMuRxPktsTable
DESCRIPTION: The number of packets received at various rates from the MU.
INDEXED ON: ccMuMac
14.3.4 ccMuTxPktsTable
DESCRIPTION: The number of packets transmitted to the MU at various rates
INDEXED ON: ccMuMac
14.3.5 ccMuRxOctetsTable
DESCRIPTION: The number of bytes received from the MU at various rates.
INDEXED ON: ccMuMac
14.3.6 ccMuTxOctetsTable
DESCRIPTION: The number of bytes transmitted to the MU at various rates.
INDEXED ON: ccMuMac
14.3.7 ccMuTxRetriesTable
DESCRIPTION: The number of packets transmitted to the MU at various retries
INDEXED ON: ccMuMac
14.4 ccMuRfSum
14.4.1 ccMuTxRetriesOctetsTable
DESCRIPTION: The number of retries experienced w.r.t the bytes transmitted to the MU
INDEXED ON: ccMuMac
14.4.2 ccMuSigStatsTable
DESCRIPTION: The various signal strength information for this MU
INDEXED ON: ccMuMac
14.4.3 ccMuSumStatsShortTable
DESCRIPTION: The table contains derived statistics calculated over a window of 30 seconds.
INDEXED ON: ccMuMac
14.4.4 ccMuSumStatsLongTable
DESCRIPTION: The table contains derived statistics calculated over a window of 1 hour.
INDEXED ON: ccMuMac
14.5 RF-Traps
RF Traps are used to generate SNMP traps when some of the RF statistical values exceed a particular
threshold.The threshold values can be configured from the CLI. You can configure only the maximun value of
the threshold. The threshold values will always be compared with the most recent short window of the
corresponding RF statistical value.
Enhanced RF Statistics 14-31
A short window can be explained as :Time period over which the threshold values (of the derived statistics)
are computed (it has a value of 30 seconds).
To enable the RF Traps you have to set the snmp_trap for the corresponding event in events context. WS5000
v2.1 supports traps for AP, Switch and MU. Currently, traps for WLAN are not supported.
The following are the traps generated for AP, Switch and MU:
Table 14.1 RF Traps for APs
rfthreshold ap pps Packets per second as averaged over the 'window'.For transmitted packets,
each packet sucessfully sent counts as 1.
rfthreshold ap thrput Actual number of bits sent and received over the window, divided by the
number of seconds in the window.
rfthreshold ap avgbitspeed An octet-weighted average of the speeds of all packets sent/received. (For
each possible speed, multiply the number of octets sent received by that
speed; divide the sum by the total number of octets; multiply
by 8).
rfthreshold ap nonucast Ratio of packets that were non-unicast to the total number of packets sent/
received.
rfthreshold ap avgsig The average of all signal values over the window.
rfthreshold ap avgretries For all transmitted packets, the average number of re-transmission attempts.
rfthreshold ap percentdrop Packets dropped divided by packets sent. Dropped here means dropped
intentionally due to the appropriate QoS queue being full.
rfthreshold ap undecryptable Ratio of packets that were undecryptable to the total number of received
packets.
rfthreshold ap associatedmus The total number of MUs associated to the given AP.
Note minpkts - Its the minimum number of packets required for the SNMP trap to
be fired.This should not be treated as a trap.
rfthreshold mu thrput Actual number of bits sent and received over the window, divided by the
number of seconds in the window.
14-32 WS5000 Series Switch System Reference Guide
rfthreshold mu avgbitspeed An octet-weighted average of the speeds of all packets sent/received. (For each
possible speed, multiply the number of octets sent received by that speed;
divide the sum by the total number of octets; multiply
by 8).
rfthreshold mu nonucast Ratio of packets that were non-unicast to the total number of packets sent/
received.
rfthreshold mu avgsig The average of all signal values over the window.
rfthreshold mu avgretires For all transmitted packets, the average number of re-transmission attempts.
rfthreshold mu percentdrop Packets dropped divided by packets sent. Dropped here means dropped
intentionally due to the appropriate QoS queue being full.
Note minpkts - Its the minimum number of packets required for the SNMP trap to
be fired.This should not be treated as a trap.
rfthreshold switch pps Packets per second as averaged over the 'window'.
rfthreshold switch thrput Actual number of bits sent and received over the window, divided by the
number of seconds in the window.
rfthreshold switch associatedmus The total number of MUs associated to the given Switch.
rfthreshold switch minpkts Read the note below.
Note minpkts - Its the minimum number of packets required for the SNMP trap to
be fired.This should not be treated as a trap.
Information is available to identify all Access Ports and their embedded radios, (called “Portals”), associated
with the wireless switch. Figure 14.2 and Figure 14.3 show the tables that give this general information.
Figure 14.2 The ccApTable lists all the Access Ports currently adopted by the wireless switch.
I
14-34 WS5000 Series Switch System Reference Guide
Figure 14.3 The ccPortalTable lists all radios (“Portals”) currently adopted by the wireless switch.
In a similar fashion, (see Figure 14.4 ), every MU currently associated with the device are shown in a table,
along with general information.
Figure 14.4 The ccMuInfoTable lists general information about every mobile unit currently associated.
Figure 14.5 These tables show how many packets/octets have been affected by the given number of retries.
Figure 14.6 shows the tables that count the number of packets or octets, (bytes), that have been either
transmitted or received at every possible data rate.
14-36 WS5000 Series Switch System Reference Guide
Figure 14.6 These tables show counts of all packets/octets transmitted/received to/from the MU
Note In all cases, variables are named from the perspective of the network
infrastructure device. For example, a packet sent from an MU is, (for the MU), a
transmitted packet, but for the wireless switch, a received packet. Using this rule,
it would be counted as a received packet.
Figure 14.7 shows sums of signal, noise, and SNR readings for all packets received, in addition to the total
number of readings that have been taken, (“NumPkts”). Specifically, for each attribute, (signal, noise, SNR),
each of the following are maintained:
• sum — this can be used to calculate the average.
• sum of each value squared — this can be used to calculate the standard deviation.
• best, worst ever seen.
• most recent value observed — this is useful for determining the trend of the most recent values.
(It would have been prohibitive to provide a histogram of all signal/noise/SNR values observed).
Enhanced RF Statistics 14-37
Figure 14.7 The ccMuSigStatsTable shows statistics for signal, noise, and SNR.
All of the above “raw” statistics have no time interval – they count the number of occurrences
since the device booted-up. Those “raw” stats are summarized over selected time-intervals: the
“short” and “long” window.
The short window represents a summary of all the packets seen in the past 30 seconds. This 30 second
backwards view is recalculated every 30 seconds. The long window represents a summary of all the packets
seen in the past 1 hour, and is updated every 1 hour.
Note The intervals mentioned above are not configurable, and could possibly
change in the future. Their actual values can be determined from read-only SNMP
variables provided in each device.
Since the “raw” stats count all occurrences since reboot, these time-based stats avoid the need to read the
values, wait, read them again, and calculate the deltas.
When the network condition changes significantly, the values in the short window will vary significantly from
those in the long window, (see the detailed example below).
Figure 14.8 shows the short and long tables – they are identical, except for the time-interval represented.
14-38 WS5000 Series Switch System Reference Guide
Figure 14.8 The ccMuSumStats tables show the key history for the past 30 seconds and past 1hr.
The device can be programmed with thresholds for most of these time-based stats. Those thresholds can be
different for the entire switch than for the WLANs than for the APs than for the MUs. When a threshold is
crossed, an SNMP trap is generated. In order to avoid false-alarms, a trap is only generated if a sufficient
number of packets have been processed to be statistically significant.
Figure 14.9 Just minutes after the antenna was removed, the long-term (1hr) average bit speed continues to-
hover near 7Mb/s while short-term (30sec) value sinks quickly to less than 2Mb.
Figure 14.10 Only one minute after the antenna was removed, the short-term statistics reflect the new
[poor]wireless conditions, while the long-term stats show the (mostly good) prior hour.
14-40 WS5000 Series Switch System Reference Guide
The RF environment is also effected by the presence/absence of antennas in the APs. The Figure 14.11 and
Figure 14.12 below shows the received and transsmit speed are severly degraded without the antenna
installed. Figure 14.13 shows retries also increase significantly without the antennas.
Figure 14.11 Without the antenna, most packets were received (by the AP300) at 1Mb/s.
Figure 14.12 Without the antenna, most packets were transmitted (by the AP300) at 1 or 2 Mb/s.
Enhanced RF Statistics 14-41
The “raw” stats also accumulate the number of packets received, the sum of all signal values on those packets,
and the sum of all each signal value squared. Taking the delta of each of those values over both the interval
with the antenna present and absent, results in average signal readings with corresponding standard
deviations.
With the antenna absent, the average signal was –88.5 dB with a stddev of 3.4, (meaning that 67% of packets
had signal values of –91.9 to –85.1 dB).
Note The greater variance while the antenna is present can be explained by the
fact that the AP radio has a certain floor of receive sensitivity, probably around –
91 dB. This fact compresses the range of possible values.
With the antenna present, the average signal was –63.6 with a stddev of 10.2 dB. Assuming the signal
readings fit a normal distribution, those curves would look approximately as shown in Figure 14.14. Note that
these values match very close to the values, (–89 and –67 dB), shown in Figure 14.10.
14-42 WS5000 Series Switch System Reference Guide
Figure 14.14 Distributions of received signal strength, as predicted by the average and standard deviationcalculated
across the collection of packets received.
Note Six standard deviations include all but two billionths of the sample. Due to
the quality control methodology called ‘Six Sigma’, the term has acquired a
commonplace meaning as containing 99.99966% of the sample. Many
corporations have adopted the Six Sigma methodology for Quality Control and try
to achieve a defect rate of 3.4 per million. The rate of 3.4 per million, however, actually
corresponds to 4.5 standard deviations, because the Six Sigma founders assumed a natural
offset of 1.5 sigma to account for drift in production quality over time.
Enhanced RF Statistics 14-43
Figure 14.15 Graph dispalying the 3 possible scenarios while monitoring the signal strenght
This begs the question: what percentage of end stations must be experiencing –63dB or better at any given
time? Depending on the situation, the requirement might be that 80% must have 63dB or better, (which the
red and green distributions achieve). Or, the requirement might be that 98% have better than –63dB, (which
only the red distribution achieves).
SLA 2 — 80% of end stations will experience –63dB or better
In any case, both the mean and the standard deviation must be monitored. If success was defined as having
80% of the end stations at –63dB or better, that would suggest that the mean of the measured signal strengths
needs to be at least one standard deviation better than –63dB; (since +/– one standard deviation accounts for
68% of a normally distributed population, that means one ‘tail’ would leave 32% / 2 = 16%, which is just
slightly better than the 20% we permit to be worse than –63dB).
So, to ensure that our threshold is met, we routinely fetch the mean and standard deviation from the wireless
infrastructure and check that mean + [one] standard deviation is less than or equal to – 63dB.10.
has 80% of the end stations at –63dB or better as averaged over a 24 hour period may not have met that
standard each and every hour of that day.
SLA 3 — Within each 30 seconds interval, 80% of end stations will experience -63dB or
better
Whatever interval the SLA specifies is the minimum interval at which monitoring must take place. Since those
intervals are often relatively short, it would clearly be more efficient for the network infrastructure device to
perform this monitoring, rather than an external server. For the infrastructure to do this well, it would allow
the threshold (-63dB in our case) to be specified, as well as the number of standard deviations, (1 in our case),
which the current mean should be from the threshold. If standard deviation is relatively constant, solely the
mean could be monitored, (but for many installations that might be a big assumption).
Additionally, it’s important that the infrastructure device ignore any calculations that are performed on too few
packets to be statistically significant. A time-period that only represents 5 packets is meaningless, regardless
of the mean and/or standard deviation.
Note Re-calculating average and stddev after each new sample would require
several multiplication, division, and square-root calculations for each packet.
Keeping a running sum and sum-of-squares requires only two additions per
packet, and a lookup (in place of the squaring function).
Additionally, using sum and sum-of-squares allows the average and standard deviation to be calculated over
any arbitrary interval of time.
Note Note that this would not be possible if the device were maintaining a
‘running’ average and ‘running’ standard deviation. The delta calculation: end-
average – start-average does not yield the average over a given interval of time.
Likewise for standard deviation.
Mean (average) can be easily calculated at any time by dividing the sum of readings by ‘n’.
Standard deviation can be calculated from ‘n’, the sum of all readings, and the sum of each reading squared.
Enhanced RF Statistics 14-45
15.1 Overview
WS5000 switch is capable of adopting different types of Access Ports. It is capable of using custom firmware
instead of default firmware images for specified APs. This functionality is used to perform the conversion from
an AP to an W-IPS sensor.
A new conversion firmware image is added to the WS5000 distribution. This image is similar to all other
firmware images that are used by the switch to adopt the variety of APs.This image contains standard WS5000
image header that identifies the image as AP300 firmware. The image version in the header is set to 0.0.0.0.
This prevents it from being used as a default image during AP300 adoption. The firmware is provided by
AirDefense and contains the code necessary for AP300 to operate in the W-IPS sensor mode.
15.2 Functionality
In addition to the basic AP to sensor conversion it is also desirable that the switch provide some minimal
management capabilities for the sensors. You should be able to view the list of sensors, read and send sensors'
configuration and revert selected sensors back to AP.
AirDefense defines Layer 2 communication protocol that can be used to discover sensors connected to the
switch and to send commands to the sensors. A broadcast ping packet is used for sensor discovery, which
implies that the sensors must stay in the same broadcast domain as the switch after the conversion. This is
not an unreasonable expectation because AP adoption and subsequent conversion to a sensor would not be
possible without it.
This extended sensor management functionality has minimal potential impact on the core WS5000
functionality.The switch maintains the list of known sensors in a separate list that does not interfere with an
existing list of AP's.
The configuration is sent to a sensor after the initial conversion and at any other time based on user's request.
The switch persistently stores a single default configuration that is sent to every sensor immediately after the
conversion. The switch does not store per-sensor configuration. You can also interactively request for
configuration of an individual sensor, modify it and send it back to the sensor.
After the conversion, the switch continuously ping newly converted sensor by sending unicast
PINGREQUEST packets to the MAC address on the VLAN in which the AP300 has been created. After the
switch receives PINGRESPONSE from the sensor it sends CONFIG_UPDATE command to the sensor and
waits for an acknowledgement. That completes the initial configuration after the conversion. If the switch fails
to receive PINGRESPONSE after 10 seconds of conversion or if the switch fails to receive an acknowledgement
after the switch logs an error.
You can select one of the sensors to change its configuration.The switch issues REQ_CONFIG command and
waits for a response. The response contains current sensor's configuration and you can make changes in it.
After the changes are made the switch sends CONFIG_UPDATE command to the sensor and waits for an
acknowledgement. If the switch fails to receive an acknowledgement it logs an error.
AP-300 Sensor Conversion 15-3
Note At any given time, you cannot send more than one configuration command to
a sensor. The sensor resets after receiving the first command and is unavailable for
45 seconds.
Note All the sensor conversion and management related functionality is disabled
by default. User is required to enable it through UI/CLI command before using any of
the described functionality. Configuration through SNMP is also supported.
1. The sensor conversion and management functionality is disabled by default. Select Enable from the
Enable Sensor drop-down box, this will enable you to convert the AP300 to a sensor.
2. Select an AP300 by clicking on the checkbox associated with each AP300. Click on the Default Config
button to view the default configuration of the sensor. This opens the WIPS Default Configuration
AP-300 Sensor Conversion 15-5
window. All the fields in this window are configurable and you can change the default configuration if
required and commit it by clicking on the Save button.
Note If you enable the DHCP, then you cannot edit Sensor IP, Subnet Mask and
Gateway fields.
15-6 WS5000 Series Switch System Reference Guide
3. Click on the Convert to Sensor button to convert the selected AP300 into a sensor. This opens the WIPS
Configuration window. Click on the Save button to commit the changes made.
4. The switch opens a dialog box prompting you to confirm the changes made. Click OK to confirm the
changes made (if any) and save the configuration to start the conversion from an AP to W-IPS.
Note If you enable the DHCP server type in the WIPS Configuration window, the
Sensor IP, Subnet Mask, Gateway will be disabled. These values will now be
provided by the DHCP server.
AP-300 Sensor Conversion 15-7
5. To view the new sensor, click on the AP300/Sensor from the tree menu on the left hand side. Select the
Sensor tab and then click on the Refresh button in the main AP300/Sensor window. It generally takes
about a minute to convert the AP into a sensor.
Figure 15.4 Viewing the newly created sensor in the Sensor tab
2. Select an sensor by clicking on the checkbox associated with the sensor that you want to convert to an
AP300. Click on the Modify button to view the current/default configuration of the sensor. This opens
the WIPS Configuration window.
Disable the DHCP, by clicking on the checkbox, to modify the values of Sensor IP and Subnet Mask . If
the DHCP server is enabled then these values (Sensor IP and Subnet Mask ) is provided by DHCP and
you cannot modify it. Click the Save button to commit the changes made, if any.
Figure 15.6 The default WIPS Configuration window displaying the default sensor configuration
AP-300 Sensor Conversion 15-9
3. The switch opens a dialog box prompting you to save the configuration. Click OK to confirm the changes
made (if any) and save the configuration.
4. To view the new AP300,click on the AP300/Sensor from the tree menu on the left hand side.Select the
AP300 tab and then click on the Refresh button in the main AP300/Sensor window. It generally takes
about a minute to convert the sensor into a AP300.
15-10 WS5000 Series Switch System Reference Guide
Syslog and Traps
The WS5000 switch supports raising of SNMP Traps and/or logging of Syslog messages, on certain events.
The list of events are listed in the table below.
The user can configure, for each event, if a SNMP Trap is to be sent, a syslog message is to be logged or both
81 Statistics has crossed the prescribed threshold by a WLAN Enabled Disabled Disabled
Whenever the WLAN has exceeded the threshold for a one or more monitored
parameters.
82 Statistics has crossed the prescribed threshold by switch Enabled Disabled Disabled
Whenever the Switch has exceeded the threshold for one or more monitored
parameters.
DDNS is based on the current ISC DHCP server on WS5000. It implements the update all feature by parsing
the existing DHCP server lease database and sends an update for every valid lease. The user class option send
by the DHCP client must perform in accordance to RFC3004. To know about this the user must specify whether
the user class option must be interpreted as a multiple user option field or not.
5. If this fails because the A entry already exists, an update is sent for the A record with the name, the
prerequisite being that the TXT record must have the same hash.
6. It next sends a PTR update.
When the lease expires or when the client sends a DHCPRELEASE, the A and PTR entries are deleted.
When an update all command is issued to a DHCP server, all leases issued by the DHCP server will be updated
on the DNS server. As this command may take considerable time to complete, it runs asynchronously. You may
view the status of the last update all command at any time.
If the update of a DDNS entry fails, it is recorded and the update all process continues with the next entry.The
status displayed will be as follows:
• If no update command has been issued since system bootup: No manual update initiated
• If an update is in progress: Update being performed: [x total, y completed, z failures]
• If an update completed with no failures: Completed x updates successfully
• If an update had failures: Update failed: [x total, y failed]
DOM Firmware Upgrade
Images Needed
1. For Upgrade on Mantis DOM's
domfix.patch.sys.img
The WS5000 switch allows the user to modify the DTIM interval. This value, also called as DTIM Period, is set
on a per AP Policy basis.
The choice of this DTIM period depends on what is more important–power consumption, or WLAN
performance.
• A longer DTIM interval results in reduced power consumption for devices in PSP mode.
• A shorter DTIM period would be desirable for voice traffic to improve voice quality.
This creates a conflict when the customer has both–WLAN phones and battery operated mobile devices that
transfer data on the same infrastructure. These two sets of devices may be on different WLANs but share
access ports. So the DTIM interval is forced to be the same for both. To solve this conflict, the user is now
enabled to set the DTIM on a per BSS basis.
Overview
The AP policy CLI context is enhanced to enable the user to set 4 DTIM interval values number 1-4. DTIM value
1 is used for BSS1, DTIM value 2 for BSS2, and so on. The first DTIM interval value is also the default, and is
-2 WS5000 Series Switch System Reference Guide
used when the AP does not support setting of DTIM per BSS, and will be indicated as such through the user
interface.
The AP indicates its ability to set the DTIM interval on a per BSS basis through the DeviceInfo message. If the
AP supports this feature, the switch will include an item with DTIM interval for each BSS the AP supports in
the configuration packet sent at adoption of the AP. If not, the switch will send the older configuration item
setting a per radio DTIM interval with the value indicated as the default DTIM interval in the AP Policy map.
If you modify the value of DTIM period for an AP Policy currently applied to any adopted APs, the switch will
send a configuration packet with the updated DTIM interval value to any such APs.
The AP sends a DTIM_POLL / QOS_DTIM_POLL for each BSS before DTIM time. The switch sends stored
broadcasts to the AP for that BSS on receipt of the message.
Currently only AP100 and AP300 support this feature.
AP300 LED Codes
Symbol Technologies provides its customers with prompt and accurate customer support. Use
the Symbol Support Center as the primary contact for any technical problem, question or support
issue involving Symbol products.
If the Symbol Customer Support specialists cannot solve a problem, access to all technical
disciplines within Symbol becomes available for further assistance and support. Symbol
Customer Support responds to calls by email, telephone or fax within the time limits set forth in
individual contractual agreements.
When contacting Symbol Customer Support, please provide the following information:
• serial number of unit
• model number or product name
• software type and version number.
A-2 WS5000 Series Switch System Reference
72E-81435-01
Document Revision A March 2006