Zebra Wing Owner's manual

  • Hello! I am an AI chatbot trained to assist you with the Zebra Wing Owner's manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
WiNG 5.6
ACCESS POINT
SYSTEM REFERENCE GUIDE
WING 5.6
ACCESS POINT
SYSTEM REFERENCE GUIDE
MN001989A01
Revision A
April 2015
ii WiNG 5.6 Access Point System Reference Guide
TABLE OF CONTENTS
About this Guide
Chapter 1, Overview
1.1 About the WiNG 5 Software ........................................................................................................................................1-3
Chapter 2, Web User Interface Features
2.1 Accessing the Web UI ..................................................................................................................................................2-2
2.1.1 Browser and System Requirements ...................................................................................................................2-2
2.1.2 Connecting to the Web UI ..................................................................................................................................2-2
2.2 Glossary of Icons Used .................................................................................................................................................2-4
2.2.1 Global Icons ........................................................................................................................................................2-4
2.2.2 Dialog Box Icons .................................................................................................................................................2-5
2.2.3 Table Icons ..........................................................................................................................................................2-5
2.2.4 Status Icons ........................................................................................................................................................2-6
2.2.5 Configurable Objects ..........................................................................................................................................2-6
2.2.6 Configuration Objects ....................................................................................................
.....................................2-9
2.2.7 Configuration Operation Icons ............................................................................................................................2-9
2.2.8 Access Type Icons .............................................................................................................................................2-10
2.2.9 Administrative Role Icons .................................................................................................................................2-10
2.2.10 Device Icons ....................................................................................................................................................2-11
Chapter 3, Quick Start
3.1 Using the Initial Setup Wizard .....................................................................................................................................3-2
3.1.1 Typical Setup Wizard ..........................................................................................................................................3-5
3.1.1.1 Virtual Controller AP Mode .......................................................................................................................3-8
3.1.1.2 Standalone Mode ......................................................................................................................................3-9
3.1.1.3 Network Topology Selection ...................................................................................................................3-10
3.1.1.4 LAN Configuration ...................................................................................................................................3-11
3.1.1.5 WAN Configuration .................................................................................................................................3-13
2 WiNG 5.6 Access Point System Reference Guide
3.1.1.6 Wireless LAN Setup ................................................................................................................................3-15
3.1.1.7 Summary And Commit Screen ................................................................................................................3-19
3.1.1.8 Adopt to a controller ...............................................................................................................................3-20
3.1.2 Advanced Setup Wizard ...................................................................................................................................3-21
3.1.2.1 Network Topology Selection ...................................................................................................................3-24
3.1.2.2 LAN Configuration ...................................................................................................................................3-25
3.1.2.3 WAN Configuration .................................................................................................................................3-27
3.1.2.4 Radio Configuration ................................................................................................................................3-29
3.1.2.5 Wireless LAN Setup ................................................................................................................................3-31
3.1.2.6 System Information .................................................................................................................................3-33
3.1.2.7 Summary And Commit Screen ................................................................................................................3-34
3.1.2.8 Adopt to a controller ...............................................................................................................................3-35
Chapter 4, Dashboard
4.1 Dashboard .....................................................................................................................................................................4-2
4.1.1 Dashboard Conventions ......................................................................................................................................4-2
4.1.1.1 Health ........................................................................................................................................................4-3
4.1.1.2 Inventory ....................................................................................................................................................4-7
4.2 Network View .............................................................................................................................................................4-10
4.2.1 Network View Display Options ........................................................................................................................4-11
4.2.2 Device Specific Information ..............................................................................................................................4-12
Chapter 5, Device Configuration
5.1 RF Domain Configuration ..............................................................................................................................................5-2
5.1.1 RF Domain Sensor Configuration ........................................................................................................................5-3
5.1.2 RF Client Name Configuration ............................................................................................................................5-4
5.1.3 RF Domain Alias Configuration ...........................................................................................................................5-5
5.1.3.1 Network Basic Alias ..................................................................................................................................5-7
5.1.3.2 Network Group Alias ...............................................................................................................................5-10
5.1.3.3 Network Service Alias ............................................................................................................................5-12
5.2 System Profile Configuration ......................................................................................................................................5-14
5.2.1 General Profile Configuration ...........................................................................................................................5-15
5.2.2 Profile Radio Power ..........................................................................................................................................5-16
5.2.3 Profile Adoption (Auto Provisioning) Configuration .......................................................................
...................5-18
5.2.4 Profile Wired 802.1X Configuration ..................................................................................................................5-20
5.2.5 Profile Interface Configuration .........................................................................................................................5-21
5.2.5.1 Ethernet Port Configuration ....................................................................................................................5-22
5.2.5.2 Virtual Interface Configuration ...............................................................................................................5-32
5.2.5.3 Port Channel Configuration .....................................................................................................................5-41
5.2.5.4 Access Point Radio Configuration ...........................................................................................................5-49
5.2.5.5 WAN Backhaul Configuration .................................................................................................................5-60
5.2.5.6 PPPoE Configuration ................................................................................................................................5-63
5.2.6 Profile Network Configuration ..........................................................................................................................5-66
5.2.6.1 DNS Configuration ..................................................................................................................................5-67
5.2.6.2 ARP ..........................................................................................................................................................5-68
Table of Contents 3
5.2.6.3 L2TPv3 Profile Configuration ...................................................................................................................5-70
5.2.6.4 IGMP Snooping .......................................................................................................................................5-80
5.2.6.5 MLD Snooping .........................................................................................................................................5-82
5.2.6.6 Quality of Service (QoS) ..........................................................................................................................5-84
5.2.6.7 Spanning Tree Configuration ..................................................................................................................5-86
5.2.6.8 Routing ....................................................................................................................................................5-89
5.2.6.9 Dynamic Routing (OSPF) ..........................................................................................................................5-92
5.2.6.10 Forwarding Database ..........................................................................................................................5-106
5.2.6.11 Bridge VLAN ........................................................................................................................................5-108
5.2.6.12 Cisco Discovery Protocol Configuration ..............................................................................................5-116
5.2.6.13 Link Layer Discovery Protocol Configuration ......................................................................................5-117
5.2.6.14 Miscellaneous Network Configuration ...............................................................................................5-118
5.2.6.15 Alias ....................................................................................................................................................5-119
5.2.6.16 Profile Network Configuration and Deployment Considerations .......................................................5-127
5.2.7 Profile Security Configuration .........................................................................................................................5-128
5.2.7.1 Defining Profile VPN Settings ...............................................................................................................5-129
5.2.7.2 Auto IPSec Tunnel .................................................................................................................................5-145
5.2.7.3 Defining Profile Security Settings .........................................................................................................5-146
5.2.7.4 Setting the Certificate Revocation List (CRL) Configuration .................................................................5-147
5.2.7.5 Setting the Profile’s NAT Configuration ...............................................................................................5-148
5.2.7.6 Setting the Profile’s Bridge NAT Configuration ....................................................................................5-156
5.2.7.7 Profile Security Configuration and Deployment Considerations ..........................................................5-158
5.2.8 Virtual Router Redundancy Protocol (VRRP) Configuration ............................................................................5-159
5.2.9 Profile Critical Resources ................................................................................................................................5-163
5.2.10 Profile Services Configuration ......................................................................................................................5-166
5.2.10.1 Profile Services Configuration and Deployment Considerations ........................................................5-167
5.2.11 Profile Management Configuration ..............................................................................................................5-168
5.2.11.1 Upgrading AP6532 Firmware from 5.1 ................................................................................................5-172
5.2.11.2 Profile Management Configuration and Deployment Considerations ................................................5-173
5.2.12 Mesh Point Configuration .............................................................................................................................5-173
5.2.12.1 Vehicle Mounted Modem (VMM) Deployment Consideration ...........................................................5-181
5.2.13 Advanced Profile Configuration ....................................................................................................................5-181
5.2.13.1 Advanced Profile Client Load Balancing .............................................................................................5-183
5.2.13.2 Configuring MINT Protocol .................................................................................................................5-187
5.2.13.3 Advanced Profile Miscellaneous Configuration .................................................................................5-192
5.2.14 Environmental Sensor Configuration ............................................................................................................5-193
5.3 Managing Virtual Controllers ...................................................................................................................................5-195
5.4 Overriding a Device Configuration ...........................................................................................................................5-197
5.4.1 Basic Configuration .........................................................................................................................................5-197
5.4.2 Certificate Management .................................................................................................................................5-199
5.4.2.1 Manage Certificates .............................................................................................................................5-201
5.4.3 RF Domain Overrides ......................................................................................................................................5-214
5.4.4 Wired 802.1X Overrides ..................................................................................................................................5-216
5.4.5 Device Overrides .............................................................................................................................................5-217
5.4.5.1 Radio Power Overrides ..........................................................................................................................5-220
5.4.5.2 Adoption Overrides ...............................................................................................................................5-222
5.4.5.3 Profile Interface Override Configuration ...............................................................................
................5-225
4 WiNG 5.6 Access Point System Reference Guide
5.4.5.4 Overriding the Network Configuration ..................................................................................................5-266
5.4.5.5 Overriding a Security Configuration ......................................................................................................5-326
5.4.5.6 Overriding the Virtual Router Redundancy Protocol (VRRP) Configuration ..........................................5-348
5.4.5.7 Profile Critical Resources ......................................................................................................................5-353
5.4.5.8 Overriding a Services Configuration .....................................................................................................5-356
5.4.5.9 Overriding a Management Configuration .............................................................................................5-357
5.4.5.10 Overriding Mesh Point Configuration .................................................................................................5-361
5.4.5.11 Overriding an Advanced Configuration ...............................................................................................5-369
5.4.5.12 Overriding Environmental Sensor Configuration ................................................................................5-379
5.5 Managing an Event Policy ........................................................................................................................................5-381
Chapter 6, Wireless Configuration
6.1 Wireless LANs ..............................................................................................................................................................6-3
6.1.1 Basic WLAN Configuration................................................................................................................................. 6-5
6.1.1.1 WLAN Basic Configuration Deployment Considerations .........................................................................6-7
6.1.2 Configuring WLAN Security ................................................................................................................................6-8
6.1.2.1 802.1x EAP, EAP-PSK and EAP MAC ........................................................................................................6-9
6.1.2.2 MAC Authentication ...............................................................................................................................6-10
6.1.2.3 PSK / None ..............................................................................................................................................6-12
6.1.2.4 Captive Portal ..........................................................................................................................................6-12
6.1.2.5 Passpoint Policy ......................................................................................................................................6-12
6.1.2.6 MAC Registration ....................................................................................................................................6-13
6.1.2.7 External Controller ..................................................................................................................................6-13
6.1.2.8 TKIP-CCMP ..............................................................................................................................................6-14
6.1.2.9 WPA2-CCMP ...........................................................................................................................................6-17
6.1.2.10 WEP 64 ..................................................................................................................................................6-20
6.1.2.11 WEP 128 and KeyGuard ........................................................................................................................ 6-22
6.1.3 Configuring WLAN Firewall Support ................................................................................................................6-24
6.1.4 Configuring Client Settings ...............................................................................................................................6-32
6.1.5 Configuring WLAN Accounting Settings ..........................................................................................................6-34
6.1.6 Configuring Service Monitoring Settings .........................................................................................................6-36
6.1.7 Configuring Client Load Balancing ...................................................................................................................6-38
6.1.8 Configuring Advanced WLAN Settings ............................................................................................................6-40
6.1.9 Configuring Auto Shutdown Settings ...............................................................................................................6-45
6.2 WLAN QoS Policy .......................................................................................................................................................6-48
6.2.1 Configuring QoS WMM Settings ......................................................................................................................6-50
6.2.2 Configuring a WLAN’s QoS Rate Limit Settings ..............................................................................................6-54
6.2.3 Configuring Multimedia Optimizations ............................................................................................................6-59
6.2.3.1 WLAN QoS Deployment Considerations ................................................................................................6-61
6.3 Radio QoS Policy .........................................................................................................................................................6-62
6.3.1 Configuring a Radio’s QoS Policy .....................................................................................................................6-63
6.4 Association ACL ..........................................................................................................................................................6-73
6.4.1 Association ACL Deployment Considerations ..................................................................................................6-75
6.5 SMART RF ...................................................................................................................................................................6-76
6.5.1 Smart RF Configuration and Deployment Considerations ................................................................................6-86
6.6 MeshConnex Policy ....................................................................................................................................................6-87
Table of Contents 5
6.7 Mesh QoS Policy .........................................................................................................................................................6-93
6.8 Passpoint Policy ........................................................................................................................................................6-100
Chapter 7, Network Configuration
7.1 Policy Based Routing (PBR) ...........................................................................................................................................7-2
7.2 L2TP V3 Configuration ..................................................................................................................................................7-8
7.3 Crypto CMP Policy ......................................................................................................................................................7-12
7.4 AAA Policy ..................................................................................................................................................................7-15
7.5 AAA TACACS Policy ...................................................................................................................................................7-26
7.6 Alias ............................................................................................................................................................................7-33
7.6.1 Network Basic Alias .........................................................................................................................................7-33
7.6.2 Network Group Alias ........................................................................................................................................7-36
7.6.3 Network Service Alias ......................................................................................................................................7-39
7.7 IPv6 Router Advertisement Policy ..............................................................................................................................7-41
7.8 Network Deployment Considerations ........................................................................................................................7-44
Chapter 8, Security Configuration
8.1 Wireless Firewall ..........................................................................................................................................................8-2
8.1.1 Defining a Firewall Configuration .......................................................................................................................8-2
8.2 Configuring IP Firewall Rules .....................................................................................................................................8-16
8.2.1 Setting an IPv4 or IPv6 Firewall Policy .............................................................................................................8-16
8.2.2 Setting an IP SNMP ACL Policy ........................................................................................................................8-20
8.3 Device Fingerprinting ..................................................................................................................................................8-23
8.4 Configuring MAC Firewall Rules ................................................................................................................................8-30
8.5 Wireless IPS (WIPS) ...................................................................................................................................................8-33
8.6 Device Categorization .................................................................................................................................................8-43
8.7 Security Deployment Considerations .........................................................................................................................8-45
Chapter 9, Services Configuration
9.1 Configuring Captive Portal Policies ..............................................................................................................................9-2
9.1.1 Configuring a Captive Portal Policy ....................................................................................................................9-2
9.2 Setting the DNS Whitelist Configuration ...................................................................................................................9-13
9.3 Setting the DHCP Server Configuration .....................................................................................................................9-14
9.3.1 Defining DHCP Pools .........................................................................................................................................9-14
9.3.2 Defining DHCP Server Global Settings .............................................................................................................9-22
9.3.3 DHCP Class Policy Configuration ......................................................................................................................9-24
9.3.4 DHCP Deployment Considerations ...................................................................................................................9-26
9.4 Setting the Bonjour Gateway Configuration ..............................................................................................................9-27
9.4.1 Configuring the Bonjour Discovery Policy .........................................................................................................9-27
9.4.2 Configuring the Bonjour Forwarding Policy ......................................................................................................9-29
9.5 Setting the DHCPv6 Server Policy ..............................................................................................................................9-32
9.5.1 Defining DHCPv6 Options .................................................................................................................................9-33
9.5.2 DHCPv6 Pool Configuration ..............................................................................................................................9-34
9.6 Setting the RADIUS Configuration .............................................................................................................................9-38
6 WiNG 5.6 Access Point System Reference Guide
9.6.1 Creating RADIUS Groups ..................................................................................................................................9-38
9.6.1.1 Creating RADIUS Groups ........................................................................................................................9-41
9.6.2 Defining User Pools ..........................................................................................................................................9-43
9.6.3 Configuring the RADIUS Server ........................................................................................................................9-46
9.7 Services Deployment Considerations .........................................................................................................................9-55
Chapter 10, Management Access
10.1 Creating Administrators and Roles .........................................................................................................................10-2
10.2 Setting the Access Control Configuration ................................................................................................................10-5
10.3 Setting the Authentication Configuration ................................................................................................................10-8
10.4 Setting the SNMP Configuration ............................................................................................................................10-10
10.5 SNMP Trap Configuration ......................................................................................................................................10-12
10.6 Management Access Deployment Considerations ................................................................................................10-13
Chapter 11, Diagnostics
11.1 Fault Management ...................................................................................................................................................11-2
11.2 Crash Files ................................................................................................................................................................11-6
11.3 Advanced ..................................................................................................................................................................11-7
11.3.1 UI Debugging ..................................................................................................................................................11-7
11.3.2 View UI Logs ...................................................................................................................................................11-8
11.3.3 View Sessions .................................................................................................................................................11-9
Chapter 12, Operations
12.1 Devices .....................................................................................................................................................................12-2
12.1.1 Managing Firmware and Configuration Files .................................................................................................12-2
12.1.1.1 Managing Running Configuration .........................................................................................................12-3
12.1.1.2 Managing Startup Configuration ..........................................................................................................12-6
12.1.2 Rebooting the Device ......................................................................................................................................12-8
12.1.3 Managing Crypto CMP Certificates ..............................................................................................................12-10
12.1.4 Upgrading Device Firmware .........................................................................................................................12-11
12.1.5 Troubleshooting the Device ..........................................................................................................................12-13
12.1.5.1 Managing Crash Dump Files ...............................................................................................................12-13
12.1.5.2 Copy Crash Info ...................................................................................................................................12-16
12.1.5.3 Copy Tech Support Dump ....................................................................................................................12-18
12.1.5.4 Locating a Device ................................................................................................................................12-20
12.1.5.5 Debugging Wireless Clients ...............................................................................................................12-21
12.1.5.6 Packet Capture ....................................................................................................................................12-23
12.1.6 Viewing Device Summary Information .........................................................................................................12-26
12.1.7 Adopted Device Upgrades ............................................................................................................................12-28
12.1.8 File Management ..........................................................................................................................................12-35
12.1.9 Adopted Device Restart ................................................................................................................................12-41
12.1.10 Captive Portal Pages ...................................................................................................................................12-42
12.1.11 Managing Crypto CMP Certificates ............................................................................................................12-47
12.1.12 Re-elect Controller ......................................................................................................................................12-48
Table of Contents 7
12.2 Certificates .............................................................................................................................................................12-50
12.2.1 Certificate Management ...............................................................................................................................12-50
12.2.2 RSA Key Management ..................................................................................................................................12-55
12.2.3 Certificate Creation .......................................................................................................................................12-60
12.2.4 Generating a Certificate Signing Request (CSR) ..........................................................................................12-62
12.3 Smart RF .................................................................................................................................................................12-65
12.3.1 Managing Smart RF for a RF Domain ...........................................................................................................12-65
12.4 Operations Deployment Considerations .................................................................................................................12-68
Chapter 13, Statistics
13.1 System Statistics .....................................................................................................................................................13-2
13.1.1 Health ..............................................................................................................................................................13-2
13.1.2 Inventory .........................................................................................................................................................13-4
13.1.3 Adopted Devices .............................................................................................................................................13-5
13.1.4 Pending Adoptions ..........................................................................................................................................13-7
13.1.5 Offline Devices ................................................................................................................................................13-8
13.1.6 Device Upgrade ...............................................................................................................................................13-9
13.1.7 Licenses ........................................................................................................................................................13-10
13.1.8 WIPS Summary .............................................................................................................................................13-13
13.2 RF Domain Statistics ..............................................................................................................................................13-16
13.2.1 Health ............................................................................................................................................................13-16
13.2.2 Inventory .......................................................................................................................................................13-19
13.2.3 Devices ..........................................................................................................................................................13-21
13.2.4 AP Detection .................................................................................................................................................13-22
13.2.5 Wireless Clients ............................................................................................................................................13-23
13.2.6 Device Upgrade .............................................................................................................................................13-24
13.2.7 Wireless LANs ..............................................................................................................................................13-26
13.2.8 Radios ...........................................................................................................................................................13-27
13.2.8.1 Status ..................................................................................................................................................13-27
13.2.8.2 RF Statistics ........................................................................................................................................13-29
13.2.8.3 Traffic Statistics ..................................................................................................................................13-30
13.2.9 Mesh .............................................................................................................................................................13-31
13.2.10 Mesh Point ..................................................................................................................................................13-32
13.2.11 SMART RF ...................................................................................................................................................13-47
13.2.12 WIPS ...........................................................................................................................................................13-52
13.2.12.1 WIPS Client Blacklist ........................................................................................................................13-52
13.2.12.2 WIPS Events ......................................................................................................................................13-53
13.2.13 Captive Portal ..............................................................................................................................................13-54
13.3 Access Point Statistics ...........................................................................................................................................13-56
13.3.1 Health ............................................................................................................................................................13-57
13.3.2 Device ...........................................................................................................................................................13-59
13.3.3 Device Upgrade .............................................................................................................................................13-62
13.3.4 Adoption ........................................................................................................................................................13-63
13.3.4.1 Adopted APs ........................................................................................................................................13-63
13.3.4.2 AP Adoption History ............................................................................................................................13-64
13.3.4.3 AP Self Adoption History ....................................................................................................................13-65
8 WiNG 5.6 Access Point System Reference Guide
13.3.4.4 Pending Adoptions ..............................................................................................................................13-66
13.3.5 AP Detection .................................................................................................................................................13-67
13.3.6 Wireless Clients ............................................................................................................................................13-68
13.3.7 Wireless LANs ..............................................................................................................................................13-69
13.3.8 Policy Based Routing ....................................................................................................................................13-71
13.3.9 Radios ...........................................................................................................................................................13-72
13.3.9.1 Status ..................................................................................................................................................13-73
13.3.9.2 RF Statistics ........................................................................................................................................13-74
13.3.9.3 Traffic Statistics ..................................................................................................................................13-75
13.3.10 Mesh ...........................................................................................................................................................13-76
13.3.11 Interfaces ....................................................................................................................................................13-77
13.3.11.1 General Interface Details ..................................................................................................................13-78
13.3.11.2 Network Graph ..................................................................................................................................13-80
13.3.12 RTLS ............................................................................................................................................................13-81
13.3.13 PPPoE ..........................................................................................................................................................13-83
13.3.14 OSPF ............................................................................................................................................................13-84
13.3.14.1 OSPF Summary ..................................................................................................................................13-85
13.3.14.2 OSPF Neighbors ................................................................................................................................13-87
13.3.14.3 OSPF Area Details .............................................................................................................................13-88
13.3.14.4 OSPF Route Statistics .......................................................................................................................13-90
13.3.14.5 OSPF Interface ...................................................................................................................................13-93
13.3.14.6 OSPF State ........................................................................................................................................13-94
13.3.15 L2TPv3 Tunnels ...........................................................................................................................................13-95
13.3.16 VRRP ............................................................................................................................................................13-97
13.3.17 Critical Resources .......................................................................................................................................13-98
13.3.18 LDAP Agent Status .....................................................................................................................................13-99
13.3.19 GRE Tunnels ..............................................................................................................................................13-100
13.3.20 Dot1x .........................................................................................................................................................13-101
13.3.21 Network ....................................................................................................................................................13-103
13.3.21.1 ARP Entries ......................................................................................................................................13-103
13.3.21.2 Route Entries ........................................................................................................
...........................13-104
13.3.21.3 Bridge ..............................................................................................................................................13-105
13.3.21.4 IGMP ................................................................................................................................................13-106
13.3.21.5 DHCP Options .................................................................................................................................13-108
13.3.21.6 Cisco Discovery Protocol ................................................................................................................13-110
13.3.21.7 Link Layer Discovery Protocol ........................................................................................................13-111
13.3.22 DHCP Server ..............................................................................................................................................13-112
13.3.22.1 DHCP Bindings ................................................................................................................................13-114
13.3.22.2 DHCP Networks ...............................................................................................................................13-115
13.3.23 Firewall .....................................................................................................................................................13-116
13.3.23.1 Packet Flows ...................................................................................................................................13-117
13.3.23.2 Denial of Service .............................................................................................................................13-118
13.3.23.3 IP Firewall Rules .............................................................................................................................13-119
13.3.23.4 MAC Firewall Rules .......................................................................................................................13-120
13.3.23.5 NAT Translations ............................................................................................................................13-121
13.3.23.6 DHCP Snooping ...............................................................................................................................13-122
13.3.24 VPN ...........................................................................................................................................................13-124
Table of Contents 9
13.3.24.1 IKESA ...............................................................................................................................................13-124
13.3.24.2 IPSec ................................................................................................................................................13-125
13.3.25 Certificates ................................................................................................................................................13-126
13.3.25.1 Trustpoints ......................................................................................................................................13-126
13.3.25.2 RSA Keys ........................................................................................................................................13-128
13.3.26 WIPS .........................................................................................................................................................13-129
13.3.26.1 WIPS Client Blacklist ......................................................................................................................13-129
13.3.26.2 WIPS Events ....................................................................................................................................13-130
13.3.27 Sensor Servers ..........................................................................................................................................13-131
13.3.28 Bonjour Services .......................................................................................................................................13-132
13.3.29 Captive Portal ............................................................................................................................................13-133
13.3.30 Network Time ...........................................................................................................................................13-135
13.3.30.1 NTP Status ......................................................................................................................................13-135
13.3.30.2 NTP Association ..............................................................................................................................13-136
13.3.31 Load Balancing ..........................................................................................................................................13-137
13.3.32 Environmental Sensors (AP8132 Models Only) ........................................................................................13-139
13.4 Wireless Client Statistics .....................................................................................................................................13-143
13.4.1 Health ..........................................................................................................................................................13-143
13.4.2 Details .........................................................................................................................................................13-146
13.4.3 Traffic ..........................................................................................................................................................13-150
13.4.4 WMM TSPEC ..............................................................................................................................................13-152
13.4.5 Association History .....................................................................................................................................13-153
13.4.6 Graph ...........................................................................................................................................................13-154
Chapter 14, WiNG Events
14.1 Event History Messages ...........................................................................................................................................14-2
Appendix A, Customer Support
Appendix B, Publicly Available Software
B.1 General Information .................................................................................................................................................... B-1
B.2 Open Source Software Used ....................................................................................................................................... B-2
B.3 OSS Licenses ............................................................................................................................................................ B-11
B.3.1 Apache License, Version 2.0 ........................................................................................................................... B-11
B.3.2 The BSD License .............................................................................................................................................. B-13
B.3.3 Creative Commons Attribution-ShareAlike License, version 3.0 .................................................................... B-13
B.3.4 DropBear License ............................................................................................................................................. B-18
B.3.5 GNU General Public License, version 2 ........................................................................................................... B-19
B.3.6 GNU Lesser General Public License 2.1 .......................................................................................................... B-23
B.3.7 GNU General Public License, version 3 ........................................................................................................... B-28
B.3.8 ISC License ..............................................................................................................
........................................ B-36
B.3.9 GNU Lesser General Public License, version 3.0 ............................................................................................ B-36
B.3.10 GNU General Public License 2.0 .................................................................................................................... B-38
B.3.11 GNU Lesser General Public License, version 2.0 .......................................................................................... B-43
10 WiNG 5.6 Access Point System Reference Guide
B.3.12 GNU Lesser General Public License, version 2.1 .......................................................................................... B-48
B.3.13 MIT License ................................................................................................................................................... B-53
B.3.14 Mozilla Public License, version 2 .................................................................................................................. B-54
B.3.15 The Open LDAP Public License ...................................................................................................................... B-58
B.3.16 OpenSSL License ........................................................................................................................................... B-58
B.3.17 WU-FTPD Software License .......................................................................................................................... B-59
B.3.18 zlib License .................................................................................................................................................... B-60
B.3.18 zlib License B-60
ABOUT THIS GUIDE
This manual supports the following access points:
Access Points – AP300, AP621, AP622, AP650, AP6511, AP6521, AP6522, AP6532, AP6562, AP7131, AP7161, AP7181,
AP8122, AP8132, AP8222, AP8232 and ES6510.
This section is organized into the following:
Document Convention
Notational Conventions
NOTE: In this guide, AP7131, AP7161, and AP7181 are collectively represented as AP71XX. Similarly,
AP8122 and AP8132 are collectively represented as AP81XX. Also, the APs AP8222 and AP8232 are
collectively represented as AP82XX.
NOTE: ES6510 is an Ethernet Switch managed by a wireless controller such as RFS4000/RFS6000/
RFS7000/NX4500/NX4524/NX6500/NX6524/NX7500/NX9000/NX9500/NX9510. ES6510 does not have
radios and does not provide WLAN support.
2 WiNG 5.6 Access Point System Reference Guide
Document Convention
The following conventions are used in this document to draw your attention to important information:
Notational Conventions
The following notational conventions are used in this document:
Italics are used to highlight specific items in the general text, and to identify chapters and sections in this and related
documents
Bullets (•) indicate:
lists of alternatives
lists of required steps that are not necessarily sequential
action items
Sequential lists (those describing step-by-step procedures) appear as numbered lists
NOTE: Indicates tips or special requirements.
CAUTION: Indicates conditions that can cause equipment damage or data loss.
WARNING! Indicates a condition or procedure that could result in personal
injury or equipment damage.
Switch Note: Indicates caveats unique to a RFS4000, RFS6000, RFS7000, NX4500,
NX4524, NX6500, NX6524, NX9000, NX9500 or NX9510 model controller or service
platform.
!
CHAPTER 1
OVERVIEW
The family of WING 5.6 supported access points enable high performance with secure and resilient wireless voice and data
services to remote locations with the scalability required to meet the needs of large distributed enterprises.
AP6511, AP6521, AP6522, AP6532, AP6562, AP71XX, AP81XX and AP82XX access points and ES6510 model ethernet switch
can now use WiNG 5 software as its onboard operating system. The unique WiNG 5 software enables the access point to
function as a Standalone “thick” access point, or a Virtual Controller AP capable of adopting and managing up to 24 access
points of the same model.
When deploying an access point as a pure Virtual Controller AP, with no RFS Series controllers available anywhere on the
network, the access point itself is a controller supporting other access points of the same model. The Virtual Controller AP can:
Provide firmware upgrades for connected access point
Aggregate statistics for the group of access points the Virtual Controller is managing
Be the single point of configuration for that deployment location
The WiNG 5 architecture is a solution designed for 802.11n networking. It leverages the best aspects of independent and
dependent architectures to create a smart network that meets the connectivity, quality and security needs of each user and
their applications, based on the availability of network resources including wired networks. By distributing intelligence and
control amongst access points, a WiNG 5 network can route directly via the best path, as determined by factors including the
user, location, the application and available wireless and wired resources. WiNG 5 extends the differentiation to the next level,
by making available services and security at every point in the network. managed traffic flow is optimized to prevent wired
NOTE: ES6510 is an Ethernet Switch managed by a wireless controller such as RFS4000/RFS6000/
RFS7000/NX4500/NX4524/NX6500/NX6524/NX7500/NX9000/NX9500/NX9510. ES6510 does not have
radios and does not provide WLAN support.
NOTE: The recommended way to administer a network populated by numerous access points is to
configure them directly from the Virtual Controller AP. If a single access point configuration requires an
update from the Virtual Controller AP’s assigned profile configuration, the administrator should apply a
Device Override to change just that access point’s configuration. For more information on applying an
override to an access point’s Virtual Controller AP assigned configuration and profile, see Device
Overrides on page 5-217.
1 - 2 WiNG 5.6 Access Point System Reference Guide
congestion and wireless congestion. Traffic flows dynamically, based on user and application, and finds alternate routes to
work around network choke points.
NOTE: This guide describes the installation and use of the WiNG 5 software designed specifically for
AP6511, AP6521, AP6522, AP6532, AP6562, AP71XX, AP81XX and AP82XX access points and ES6510
model ethernet switch. It does not describe the version of the WiNG 5 software designed for use with
the RFS4000, RFS6000, RFS7000, NX4500, NX4524, NX6500, NX6524, NX7500, NX9000, NX9500 and
NX9510. For information on using WiNG 5 in a controller managed network, go to
www.zebra.com/support
.
Overview 1 - 3
1.1 About the WiNG 5 Software
The WiNG 5 architecture is a solution designed for 802.11n networking. It leverages the best aspects of independent and
dependent architectures to create a smart network that meets the connectivity, quality and security needs of each user and
their applications, based on the availability of network resources including wired networks. By distributing intelligence and
control amongst access points, a WiNG 5 network can route directly via the best path, as determined by factors including the
user, location, the application and available wireless and wired resources. WiNG 5 extends differentiation to the next level, by
making available services and security at every point in the network. Access point managed traffic flow is optimized to prevent
wired congestion and wireless congestion. Traffic flows dynamically, based on user and application, and finds alternate routes
to work around network choke points.
With this latest WiNG 5 release, the network can use access points to adapt to the dynamic circumstances of their deployment
environment. The WiNG 5 architecture provides a customized site-specific deployment, supporting the best path and routes
based on the user, location, application and the best route available (both wireless and wired). A WiNG 5 access point managed
network assures end-to-end quality, reliability and security without latency and performance degradation. A WiNG 5 access
point managed network supports rapid application delivery, mixed-media application optimization and quality assurance.
Deploying a new WiNG 5 access point managed network does not require the replacement of existing access points. WiNG 5
enables the simultaneous use of existing architectures from Symbol and other vendors, even if those other architectures are
centralized models. A wireless network administrator can retain and optimize legacy infrastructure while evolving to WiNG 5
as needed.
By distributing intelligence and control amongst access points, a WiNG 5 network can route data directly using the best path.
As a result, the additional load placed on the wired network from 802.11n support is significantly reduced, as traffic does not
require an unnecessary backhaul.
Within a WiNG 5 network, up to 80% of the network traffic can remain on the wireless mesh, and never touch the wired
network, so the 802.11n load impact on the wired network is negligible. In addition, latency and associated costs are reduced
while reliability and scalability are increased. A WiNG 5 network enables the creation of dynamic wireless traffic flows, so
bottlenecks can be avoided, and the destination is reached without latency or performance degradation. This behavior delivers
a significantly better quality of experience for the end user.
The same distributed intelligence enables more resilience and survivability, since access points keep users connected and
traffic flowing with full QoS, security and mobility even if a connection is interrupted due to a wired network or backhaul
problem.
When the network is fully operational, sources of interference or unbalanced wireless network loading can be automatically
corrected by the access point’s Smart RF functionality. Smart RF senses interference or potential client connectivity problems
and makes the required changes to the channel and access point radio power while minimizing the impact to latency sensitive
applications like VoIP. Using Smart RF, the network can continuously adjust power and channel assignments for self-recovery
if an access point radio fails or a coverage hole is detected.
Additionally, integrated access point sensors, in conjunction with AirDefense Network Assurance, alerts administrators of
interference and network coverage problems, which shortens response times and boosts overall reliability and availability of
the access point managed network.
Network traffic optimization protects the network from broadcast storms and minimizes congestion on the wired network. The
access point managed network provides VLAN load balancing, WAN traffic shaping and optimizations in dynamic host
configuration protocol (DHCP) responses and Internet group management protocol (IGMP) snooping for multicast traffic flows
in wired and wireless networks. Thus, users benefit from an extremely reliable network that adapts to meet their needs and
delivers mixed-media applications.
Firmware and configuration updates are supported from one access point to another, over the air or wire, and can be centrally
managed by an access point in Virtual Controller AP mode. Controllers no longer need to push firmware and configurations to
individual access point, thus reducing unnecessary network congestion.
1 - 4 WiNG 5.6 Access Point System Reference Guide
/