Motorola RFS7000 Series Installation guide

  • Hello! I am an AI chatbot trained to assist you with the Motorola RFS7000 Series Installation guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
RFS7000 Series RF Switch
System Reference Guide
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Symbol
is a registered trademark of Symbol Technologies, Inc. All other product or service names are the
property of their respective owners. © Motorola, Inc. 2008. All rights reserved.
About this Guide
Introduction
This guide provides information about using the RFS7000 Series RF Switch.
Documentation Set
The documentation set for the RFS7000 Series Switch is partitioned into the following guides to provide information for
specific user needs.
RFS7000 Installation Guide - describes the basic setup and configuration required to transition to more advanced
configuration of the switch.
RFS7000 CLI Reference - describes the Command Line Interface (CLI) commands used to configure the
RFS7000 switch.
RFS7000 Troubleshooting Guide - describes workarounds to known conditions the user may encounter.
Document Conventions
The following conventions are used in this document to draw your attention to important information:
NOTE Screens and windows pictured in this guide are samples and can differ from actual screens.
NOTE Indicate tips or special requirements.
CAUTION Indicates conditions that can cause equipment damage or data loss.
WARNING! Indicates a condition or procedure that could result in personal injury or equipment damage.
!
iv RFS7000 Series Switch System Reference Guide
Notational Conventions
The following additional notational conventions are used in this document:
Italics are used to highlight the following:
- Chapters and sections in this and related documents
- Dialog box, window and screen names
- Drop-down list and list box names
- Check box and radio button names
- Icons on a screen.
GUI text is used to highlight the following:
- Screen names
- Menu items
- Button names on a screen.
bullets (•) indicate:
- Action items
- Lists of alternatives
- Lists of required steps that are not necessarily sequential
Sequential lists (e.g., those that describe step-by-step procedures) appear as numbered lists.
Contents
Chapter 1. Overview
Hardware Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Physical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Power Cord Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Power Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Cabling Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
System Status LED Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
System Status LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-4
RJ-45 Gigabit Ethernet LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-6
SFP Gigabit Ethernet LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-6
Out of Band Management Port LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-7
Software Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-7
Infrastructure Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-8
Installation Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-8
Licensing Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-8
Configuration Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-9
Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-9
Serviceability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-9
Tracing / Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-9
Process Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-10
Hardware Abstraction Layer and Drivers. . . . . . . . . . . . . . . . . . . . . . . . .1-10
Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-10
Secure Network Time Protocol (SNTP) . . . . . . . . . . . . . . . . . . . . . . . . . .1-10
Password Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
Wireless Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
Adaptive AP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-11
Physical Layer Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-12
Proxy-ARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-13
Hotspot / IP Redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-13
IDM (Identity Driven Management) . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-14
Voice Prioritization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-14
Self Healing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-14
Wireless Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-15
AP and MU Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-15
Wireless Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-16
vi RFS7000 Series Switch System Reference Guide
Power Save Polling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-17
Wireless Layer 2 Switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Automatic Channel Selection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
WMM-Unscheduled APSD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Multiple VLANs per WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-19
Wired Switching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
DHCP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
DDNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
VLAN Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-21
Interface Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22
Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-22
Encryption and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23
MU Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23
Secure Beacon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
MU to MU Allow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
MU to MU Disallow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Switch - to - Wired . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
802.1x Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
WIPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-25
Rogue AP Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-26
ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Local Radius Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
IPSec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
Certificate Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-29
NAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30
Access Port Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-30
Chapter 2. Switch Web UI Access & Image Upgrades
Accessing the Switch Web UI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Web UI Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Connecting to the Switch Web UI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Switch Password Recovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Chapter 3. Switch Information
Viewing the Switch Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Viewing the Switch Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Viewing Dashboard Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Viewing Switch Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Viewing Switch Port Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Viewing the Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Editing the Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Viewing the Ports Runtime Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
Table of Contents vii
Viewing the Ports Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-12
Detailed Port Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-13
Viewing the Port Statistics Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-15
Viewing Switch Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-16
Viewing the Detailed Contents of a Config File . . . . . . . . . . . . . . . . . . . . . . .3-17
Transferring a Config File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-18
Viewing Switch Firmware Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-21
Editing the Switch Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-22
Updating the Switch Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-23
Switch File Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-25
Transferring Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-25
Transferring a file from Wireless Switch to Wireless Switch . . . . . . . .3-26
Transferring a file from a Wireless Switch to a Server. . . . . . . . . . . . . .3-27
Transferring a file from a Server to a Wireless Switch. . . . . . . . . . . . . .3-27
Viewing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-29
Configuring Automatic Updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-30
Viewing the Switch Alarm Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-32
Viewing Alarm Log Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-34
Viewing Switch Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-36
How to use the Filter Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-37
Chapter 4. Network Setup
Displaying the Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Viewing Network IP Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Configuring DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Adding an IP Address for a DNS Server . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Configuring Global Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Configuring IP Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
Adding a New Static Route . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Viewing Address Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
Viewing and Configuring Layer 2 Virtual LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9
Viewing and Configuring VLANs by Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-9
Editing the Details of an Existing VLAN . . . . . . . . . . . . . . . . . . . . . . . . .4-10
Viewing and Configuring Ports by VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-11
Editing a VLAN by Port Designation . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Configuring Switch Virtual Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-13
Configuring the Virtual Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-14
Adding a Virtual Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Modifying a Virtual Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-16
Viewing Virtual Interface Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
Viewing Virtual Interface Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-20
Viewing the Virtual Interface Statistics Graph . . . . . . . . . . . . . . . . . . . .4-21
Viewing and Configuring Switch WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-23
Configuring WLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-23
Editing the WLAN Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Assigning Multiple VLANs per WLAN. . . . . . . . . . . . . . . . . . . . . . . . . . .4-31
viii RFS7000 Series Switch System Reference Guide
Configuring Authentication Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-33
Configuring Different Encryption Types. . . . . . . . . . . . . . . . . . . . . . . . . .4-50
Viewing WLAN Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-55
Viewing WLAN Statistics Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-56
Viewing WLAN Statistics in a Graphical Format. . . . . . . . . . . . . . . . . . .4-59
Viewing WLAN Switch Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-60
Configuring WMM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-61
Editing WMM Setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-65
Configuring the NAC Inclusion List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-66
Adding an Include List to a WLAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-68
Configuring Devices on the Include List. . . . . . . . . . . . . . . . . . . . . . . . . .4-68
Mapping Include List Items to WLANs . . . . . . . . . . . . . . . . . . . . . . . . . .4-69
Configuring the NAC Exclusion List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-70
Adding an Exclude List to the WLAN. . . . . . . . . . . . . . . . . . . . . . . . . . . .4-71
Configuring Devices on the Exclude List . . . . . . . . . . . . . . . . . . . . . . . . .4-71
Mapping Exclude List Items to WLANs . . . . . . . . . . . . . . . . . . . . . . . . . .4-72
NAC Configuration Examples Using the Switch CLI . . . . . . . . . . . . . . . . . . . .4-73
Creating an Include List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-73
Creating an Exclude List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-74
Configuring the WLAN for NAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-74
Viewing Associated MUs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-76
Viewing MU Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-76
Viewing MU Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-77
Viewing MU Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-79
Viewing MU Statistics Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-80
View a MU Statistics Graph. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-82
Viewing Access Port Radio Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-84
Configuring Access Port Radios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-84
Configuring an AP’s Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-86
Editing AP Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-88
Adding APs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-93
Viewing AP Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-94
Viewing APs Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-96
Viewing an AP’s Graph. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-98
Configuring WLAN Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-99
Editing a WLAN Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-100
Configuring WMM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-101
Editing WMM Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-103
Reviewing Bandwidth Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-104
Viewing Access Port Adoption Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-105
Configuring AP Adoption Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-105
Editing Default Radio Adoption Settings . . . . . . . . . . . . . . . . . . . . . . . .4-107
Configuring Layer 3 Access Port Adoption. . . . . . . . . . . . . . . . . . . . . . . . . . .4-112
Configuring WLAN Assignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-113
Configuring WMM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-115
Editing Access Port Adoption WMM Settings. . . . . . . . . . . . . . . . . . . .4-116
Table of Contents ix
Viewing Access Port Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-117
Viewing Adopted Access Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-117
Viewing Unadopted Access Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-119
Multiple Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-120
Configuring a Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-122
Viewing and Configuring Bridge Instance Details. . . . . . . . . . . . . . . . . . . . .4-125
Creating a Bridge Instance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-125
Associating VLANs to a Bridge Instance. . . . . . . . . . . . . . . . . . . . . . . .4-126
Configuring a Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-126
Editing a MST Port Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-130
Viewing and Configuring Port Instance Details. . . . . . . . . . . . . . . . . . . . . . .4-131
Editing a Port Instance Configuration . . . . . . . . . . . . . . . . . . . . . . . . . .4-133
Chapter 5. Switch Services
Displaying the Services Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2
DHCP Server Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4
Configuring the Switch DHCP Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4
Editing the Properties of an Existing DHCP Pool . . . . . . . . . . . . . . . . . . . .5-6
Adding a New DHCP Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-7
Configuring DHCP Global Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9
Configuring DHCP Server DDNS Values . . . . . . . . . . . . . . . . . . . . . . . . .5-10
Configuring Existing Host Pools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-11
Configuring Excluded IP Address Information . . . . . . . . . . . . . . . . . . . . . . . . .5-12
Configuring DHCP Server Relay Information . . . . . . . . . . . . . . . . . . . . . . . . . .5-13
Viewing DDNS Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-15
Viewing DHCP Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-16
Reviewing DHCP Dynamic Bindings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-18
Configuring DHCP User Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-19
Adding a New DHCP User Class Name . . . . . . . . . . . . . . . . . . . . . . . . . .5-20
Editing the Properties of an Existing DHCP User Class Name . . . . . . . .5-20
Configuring DHCP Pool Class. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-22
Editing an Existing DHCP Pool Class Name. . . . . . . . . . . . . . . . . . . . . . .5-23
Adding a New DHCP Pool Class Name . . . . . . . . . . . . . . . . . . . . . . . . . .5-23
Configuring Secure NTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-24
Defining the Secure NTP Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-24
Configuring Symmetric Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-26
Adding a New SNTP Symmetric Key . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-27
Defining a NTP Neighbor Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-28
Adding an NTP Neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-30
Viewing NTP Associations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-31
Viewing NTP Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-34
Configuring Switch Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-35
Reviewing Redundancy Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-39
Configuring Redundancy Group Membership . . . . . . . . . . . . . . . . . . . . . . . . .5-41
Displaying Redundancy Member Details. . . . . . . . . . . . . . . . . . . . . . . . .5-43
Adding a Redundancy Group Member. . . . . . . . . . . . . . . . . . . . . . . . . . .5-45
Redundancy Group License Aggregation Rules. . . . . . . . . . . . . . . . . . . . . . . .5-45
x RFS7000 Series Switch System Reference Guide
Layer 3 Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-46
Configuring Layer 3 Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-46
Defining the Layer 3 Peer List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-49
Reviewing Layer 3 Peer List Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-50
Reviewing Layer 3 MU Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-51
Configuring Self Healing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-53
Configuring Self Healing Neighbor Details . . . . . . . . . . . . . . . . . . . . . . . . . . .5-54
Editing the Properties of a Neighbor . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-55
Configuring Switch Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-57
Configuring Discovery Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-57
Adding a New Discovery Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-59
Viewing Recently Found Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-60
Configuring SOLE Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-62
Defining the SOLE Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-62
Viewing SOLE Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-63
Reviewing SOLE Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-64
Chapter 6. Switch Security
Displaying the Main Security Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-2
AP Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4
Enabling and Configuring AP Detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4
Adding or Editing an Allowed AP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-6
Approved APs (Reported by APs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-7
Unapproved APs (Reported by APs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-8
Unapproved APs (Reported by MUs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
MU Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-10
Configuring MU Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-10
Viewing Filtered MUs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-12
Configuring Wireless Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-14
Editing an Existing Wireless Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-15
Adding a new Wireless Filter. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-16
Associating an ACL with WLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-17
ACL Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19
ACL Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-19
Router ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-20
Port ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-21
Wireless LAN ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-21
ACL Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-21
Precedence Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-22
Configuring an ACL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-22
Adding a New ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-23
Adding a New ACL Rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-24
Editing an Existing Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-26
Attaching an ACL L2/L3 Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-27
Adding a New ACL L2/L3 Configuration . . . . . . . . . . . . . . . . . . . . . . . . .6-28
Attaching an ACL on a WLAN Interface/Port . . . . . . . . . . . . . . . . . . . . . . . . .6-30
Adding or Editing a New ACL WLAN Configuration . . . . . . . . . . . . . . . .6-31
Table of Contents xi
Reviewing ACL Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-31
Configuring NAT Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-33
Defining Dynamic NAT Translations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-33
Adding a New Dynamic NAT Configuration . . . . . . . . . . . . . . . . . . . . . .6-35
Defining Static NAT Translations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-36
Adding a New Static NAT Configuration. . . . . . . . . . . . . . . . . . . . . . . . .6-38
Configuring NAT Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-39
Viewing NAT Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-41
Configuring IKE Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-42
Defining the IKE Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-42
Setting IKE Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-44
Viewing SA Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-47
Configuring IPSec VPN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-49
Defining the IPSec Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-51
Editing an Existing Transform Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-52
Adding a New Transform Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-54
Defining the IPSec VPN Remote Configuration . . . . . . . . . . . . . . . . . . . . . . . .6-55
Configuring IPSEC VPN Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-57
Configuring Crypto Maps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-59
Crypto Map Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-60
Crypto Map Peers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-62
Crypto Map Manual SAs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-64
Crypto Map Transform Sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-66
Crypto Map Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-67
Viewing IPSec Security Associations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-69
Configuring the Radius Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-71
Radius Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-71
User Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-72
Authentication of Terminal/Management User(s). . . . . . . . . . . . . . . . . .6-73
Access Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-73
Proxy to External Radius Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-73
LDAP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-73
Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-73
Using the Switch’s Radius Server Versus an External Radius Server. . . . . . .6-73
Defining the Radius Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-74
Radius Client Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-75
Radius Proxy Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-76
Configuring Radius Authentication and Accounting . . . . . . . . . . . . . . . . . . . .6-77
Configuring Radius Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-79
Configuring Radius User Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-82
Viewing Radius Accounting Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-85
Creating Server Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-86
Using Trustpoints to Configure Certificates . . . . . . . . . . . . . . . . . . . . . . . . . .6-86
Creating a Server / CA Root Certificate. . . . . . . . . . . . . . . . . . . . . . . . . .6-88
Configuring Trustpoint Associated Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-94
Adding a New Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-95
Transferring Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-95
xii RFS7000 Series Switch System Reference Guide
Configuring Enhanced Beacons and Probes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-96
Configuring the Beacon Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-96
Configuring the Probe Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-99
Reviewing the Beacons Found Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-100
Reviewing the Probes Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-102
Chapter 7. Switch Management
Displaying the Management Access Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2
Configuring Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-3
Configuring SNMP Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-5
Configuring SNMP v1/v2 Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-5
Editing an Existing SNMP v1/v2 Community Name . . . . . . . . . . . . . . . . .7-6
Configuring SNMP v3 Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-7
Editing a SNMP v3 Authentication and Privacy Password . . . . . . . . . . . .7-9
Accessing SNMP v2/v3 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-9
Configuring SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-11
Enabling Trap Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-11
Configuring Trap Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-13
Wireless Trap Threshold Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-15
Configuring SNMP Trap Receivers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-17
Editing SNMP Trap Receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-18
Adding SNMP Trap Receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-19
Configuring Management Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-20
Configuring Local Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-20
Creating a New Local User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-21
Modifying an Existing Local User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-22
Creating a Guest Admin and Guest User. . . . . . . . . . . . . . . . . . . . . . . . .7-24
Configuring Switch Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-25
Modifying the Properties of an Existing Radius Server. . . . . . . . . . . . . .7-27
Adding a New Radius Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-28
Chapter 8. Diagnostics
Displaying the Main Diagnostic Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2
Switch Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-2
CPU Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-3
Switch Memory Allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-5
Switch Disk Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-6
Switch Memory Processes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-7
Other Switch Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-8
Configuring System Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-9
Log Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-9
File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-10
Viewing the Entire Contents of Individual Log Files . . . . . . . . . . . . . . . .8-12
Transferring Log Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-14
Reviewing Core Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-15
Transferring Core Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-16
Table of Contents xiii
Reviewing Panic Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-17
Viewing Panic Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-18
Transferring Panic Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-18
Debugging the Applet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-19
Configuring a Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-20
Modifying the Configuration of an Existing Ping Test . . . . . . . . . . . . . . . . . . 8-22
Adding a New Ping Test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Viewing Ping Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-24
xiv RFS7000 Series Switch System Reference Guide
Overview
The RFS7000 switch is a centralized management solution for wireless networking. It connects to non-legacy
access ports through L2 or L3 (L2 is preferable, if the situation allows it).
Access ports function as radio antennas for data traffic management and routing. System configuration and
intelligence for the wireless network resides with the switch. The switch uses access ports to bridge data to
and from wireless devices. The wireless switch applies appropriate policies to data packets before forwarding
them to their destination.
All data packets to and from wireless devices are processed by the switch, where appropriate policies are
applied before they are decapsulated and sent to their destination.
Access port configuration is managed by the switch through a Web UI Graphical User Interface (GUI), SNMP
or the switch Command Line Interface (CLI).
1.1 Hardware Overview
The RFS7000 is a rack-mountable device that manages all inbound and outbound traffic on the wireless
network. It provides security, network service and system management applications.
Unlike traditional wireless infrastructure devices that reside at the edge of a network, the switch uses
centralized, policy-based management to apply sets of rules or actions to all devices on the wireless network.
It collects management “intelligence” from individual access ports/points and moves the collected information
into the centralized switch.
Access ports (APs) are 48V Power-over-Ethernet devices connected to the switch by an Ethernet cable. An
access port receives 802.11x data from MUs and forwards the data to the switch which applies the appropriate
policies and routes the packets to their destinations.
Overview
1-2
Access ports do not have software or firmware upon initial receipt from the factory. When the access port is
first powered on and cleared for the network, the switch initializes the access port and installs a small
firmware file automatically. Installation and firmware upgrades are automatic and transparent.
1.1.1 Physical Specifications
The physical dimensions and operating parameters of the switch include:
1.1.1.1 Power Cord Specifications
A power cord is not supplied. Use only a correctly rated power cord certified for the country of operation.
1.1.1.2 Power Protection
To best protect the switch from unexpected power surges or other power-related problems, ensure the system
installation meets the following power protection guidelines:
If possible, use a dedicated circuit to protect data processing equipment. Commercial electrical
contractors are familiar with wiring for data processing equipment and can help with the load
balancing of dedicated circuits.
Install surge protection. Use a surge protection device between the electricity source and the switch.
Install an Uninterruptible Power Supply (UPS). A UPS provides continuous power during a power
outage. Some UPS devices have integral surge protection. UPS equipment requires periodic
maintenance to ensure reliability. A UPS of the proper capacity for the data processing equipment
must be purchased.
Width 440mm (17.32 in)
Height 44.45mm (1.75 in)
Depth 390.8mm (15.38 in)
Weight 6.12 Kg (13.5 lbs)
Operating Temperature 0°C - 40°C
Operating Humidity 5% - 85% RH, non-condensing
Operating Altitude 3 km (10,000 ft.)
Overview
1-3
1.1.1.3 Cabling Requirements
The RFS7000 has four RJ-45 Gigabit Ethernet ports, four Gigabit SFP (fiber) ports, one out-of-band
management port and one console connector. The illustration below displays each of ports and the cables or
devices attaching to them.
Again, a power cord is not supplied with the switch. Use only a correctly rated power cord certified for the
country of operation. Initial installation instructions are described in the RFS7000 Series Switch Installation
Guide included with the switch.
V\PB
*LJDELW(WKHUQHW
6)3V
&RQVROH
FRQQHFWRU
2XWRIEDQG
PDQDJHPHQW
SRUW
0(3RUW
&RPSDFW
)ODVK
86%
SRUWV
*LJDELW(WKHUQHW
5-V
V
2XWRI%DQG
0DQDJHPHQW
*LJDELW
6)3
3RUW
*LJDELW
(WKHUQHW
3RUW
&RQVROH
&RPSDFW)ODVK
86%
86%
*LJDELW
(WKHUQHW
3RUW
*LJDELW
6)3
3RUW
*LJDELW
6)3
3RUW
*LJDELW
6)3
3RUW
*LJDELW
(WKHUQHW
3RUW
*LJDELW
(WKHUQHW
3RUW
Overview
1-4
1.1.2 System Status LED Codes
The RFS7000 has four vertically-stacked LEDs on its front panel. Each of the switch’s Gigabit Ethernet ports
have two status LEDs. These LEDs display two colors (green & amber), and three lit states (solid, blinking, and
off). The following tables describe the combinations of LED colors and states for the System Status LEDs and
the Gigabit Ethernet LEDs.
1.1.2.1 System Status LEDs
Start Up / POST (Primary System or Redundant System)
Switch Status (Primary System)
System Status 1 LED System Status 2 LED Event
Off Off Power off
Green Blinking Green Blinking Power On Self Test (POST) running
Green Solid Green Blinking POST succeeded (Operating System Loading)
Green Solid Off POST succeeded (Normal Operation)
Amber Blinking Off POST Failure
Alternating Green Blinking
& Amber Blinking
Alternating Green Blinking
& Amber Blinking
Boot Up Error: Device has an invalid checksum
NOTE When starting the switch, the Temperature Status LED will be Solid Amber. This is
normal behavior and does not indicate an error. At the completion of the start-up
process, the Temperature Status LED will switch to Solid Green.
System Status 1 LED System Status 2 LED Event
Off Off Power off
Green Solid Off No Redundancy Feature Enabled
Green Solid Green Solid
Redundancy Feature Enabled
Actively Adopting Access Ports
Green Solid Amber Blinking
No License to adopt Access Ports
or
No Country Code configured on the switch
or
License and Country Code configured, but no
APs adopted
6\VWHP6WDWXV
)DQVWDWXV
7HPSHUDWXUHVWDWXV
6\VWHP6WDWXV
Overview
1-5
Switch Status (Redundant System)
Fan LED
Temperature Status LED
System Status 1 LED System Status 2 LED Event
Off Off Power off
Green Solid Off No redundancy feature enabled
Green Blinking Green Solid
Redundant system failed over and adopting
ports
Green Blinking
Alternating Green Blinking
& Amber Blinking
Redundant system not failed over.
Green Solid Amber Blinking
No License to adopt Access Ports
or
No Country Code configured on the switch
or
License and Country Code configured, but no
APs adopted
Fan LED Event
Off System Off / POST Start
Green Blinking POST in process
Green Solid All system fans in normal operation
Amber Solid
Redundant cooling failure
System operational
Amber Blinking
System cooling failure
System will be held in reset until the issue is
resolved
Temperature LED Event
Off System Off
Green Solid
Ambient inlet temperature is within specified
operating limit
Amber Solid
Ambient inlet temperature is near the maximum
operating temperature
When starting the switch, this LED will be lit
Solid Amber. This is normal behavior and does
not indicate an error
Amber Blinking
Ambient inlet temperature is above the
maximum specified operating temperature
System will be held in reset until the issue is
resolved
Overview
1-6
1.1.2.2 RJ-45 Gigabit Ethernet LEDs
RJ-45 Port Speed LED
RJ-45 Port Status LED
1.1.2.3 SFP Gigabit Ethernet LEDs
Port Speed LED Event
Off 10 Mbps
Green Solid 100 Mbps
Green Blinking 1000 Mbps
Amber Blinking Port fault
Port Status LED Event
Off No link or administratively shut down
Green Solid Link present
Green Blinking Activity: Transmit and receive
Amber Blinking Link fault
V\PB
3RUW
VSHHG
3RUW
VWDWXV
3RUW
VSHHG
3RUW
VWDWXV
V\PB
3RUW
VSHHG
3RUW
VWDWXV
/