WaveOS User Guide DTUS070
WaveOS User Guide DTUS070
USER GUIDE
REGISTERED TRADEMARKS ®
➢ ACKSYS is a registered trademark of ACKSYS.
➢ Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.
➢ CISCO is a registered trademark of the CISCO company.
➢ Windows is a registered trademark of MICROSOFT.
➢ WireShark is a registered trademark of the Wireshark Foundation.
➢ HP OpenView® is a registered trademark of Hewlett-Packard Development Company,
L.P.
➢ VideoLAN, VLC, VLC media player are internationally registered trademark of the
French non-profit organization VideoLAN.
TABLE OF CONTENTS
I INTRODUCTION ............................................................................................... 7
X.8 The GRE tunnel does not forward data? ................................................................................... 302
X.9 FTP through a NAT router ......................................................................................................... 304
I INTRODUCTION
This reference guide applies to the following devices:
Wherever this document refers to “the product” without further precision, it means one
of the products in the above list.
Together with the quick start guide included in the product package, it covers product
installation, configuration and usage, and general information about Wi-Fi protocols.
The firmware change log (which you can download from the ACKSYS web site) explains
which features are available depending on the firmware version.
All recommendations for equipment installation, such as power supplies, antennas and
connection cables are documented in the quick installation guide specific to each
product.
Installation and use of this Wireless LAN device must be in strict accordance with the
instructions included in the user documentation provided with the product. Any changes or
modifications (including the antennas) made to this device that are not expressly approved by
the manufacturer may void the user’s authority to operate the equipment. The manufacturer
is not responsible for any radio or television interference caused by unauthorized
modification of this device, or the substitution of the connecting cables and equipment other
than manufacturer specified. It is the responsibility of the user to correct any interference
caused by such unauthorized modification, substitution or attachment. Manufacturer and any
authorized resellers or distributors will assume no liability for any damage or violation of
government regulations arising from failing to comply with these guidelines.
Information in this document is subject to change without notice and does not represent a
commitment on the part of ACKSYS.
ACKSYS provides this document “as is”, without warranty of any kind, expressed or implied,
including, but not limited to, its particular purpose and takes no responsibility for the
profitability or the suitability of the equipment for the requirements of the user.
ACKSYS reserves the right to make improvements and/or changes to this manual, or to the
products and/or the programs described in this manual, at any time.
However, ACKSYS assumes no responsibility for its use, or for any infringements on the rights
of third parties that may result from its use.
This product might include unintentional technical or typographical errors. Changes are
periodically made to the information herein to correct such errors and these changes are
incorporated in new editions of the publication.
Ethernet capabilities:
10/100/1000 base T
Auto-crossing (MDX)
Automatic speed and duplex selection
Processor
Hardware
Ethernet Cellular card Alarm, Reset
802.11n,ac WIFI Radio Card GNSS C-Key Flash RAM
802.3 SIM digital I/O Button
The radiation patterns shown in the next sections are only provided as examples to give a
better understanding of the distinctive characteristics of each antenna type.
This type of antenna is used to cover a wide area all around the antenna.
When using them, make sure that they are placed in the same plane.
This kind of antenna focuses radiations on one side (see radiation pattern below). This
allows wall mounting without wasting radiations in the wall. The gain is generally comprised
between 7dBi and 9dBi.
This kind of antenna also focuses radiations on one side (see radiation pattern below). But
its gain is usually higher than patch antenna (11dBi to 15dBi).
This antenna focus the radiations in one point and then can achieve very high gain (>20dBi).
Antenna manufacturers provide MIMO version of each antenna type described previously.
MIMO antennas are basically a set of several (usually 2 or 3) standard antennas put together
in a single enclosure.
In any case, refer to the antenna datasheet to get information about the Radiation pattern
and internal layout.
For outdoor link, products must be “line of sight” from the other one. This is a
mandatory condition and should be considered with attention. The schematic below
explains what we mean by “line of sight”.
Near Line Of Sight can usually be dealt with using better antennas, but Non Line Of
Sight usually requires alternative paths or multipath propagation methods.
Obstacles that commonly cause NLOS conditions include buildings, trees, hills,
mountains …
III.3.2 802.11n/ac
With these norms, considerations about EIRP and RSSI are still relevant. But the 802.11n/ac
takes advantage of MIMO (Multiple Input Multiple Output) technology and introduces new
ways to use multiple antennas.
802.11a/b/g products already use more than one antenna but they were limited to the
diversity mode (only one antenna transmits at a time). Moreover, bounces on walls or other
obstacles cause multiple paths that confuse the receiver (see figure below).
802.11n/ac uses these bounces to allow several independent streams (2 to 4) to be sent and
identified simultaneously. At the beginning of the transmission, a well-known pattern is
sent. The receiver uses that pattern to calibrate itself and characterize the transmission
channel for each antenna.
Using that information, the receiver is able to calculate which stream belongs to what
antenna.
In this case there must be at least one antenna per stream to be sent. Supernumerary
antennas are used to transmit additional spatial information.
Since 802.11n/ac use bounces to increase bandwidth, a line of sight outdoor application will
have less performance compared to an indoor one, because there are potentially no
bounces at all. This problem can be solved by sending polarized radio waves orthogonal to
each other. Such so-called “Slant Antennas” are actually made of 2 specifically polarized
antennas put together in a single case.
Although the use of “non-overlapping” channels 1, 6, and 11 has limits when products are
too close, the 1–6–11 guideline has merit. If transmitter channels are chosen closer than
channels 1, 6 and 11 (for example, 1, 4, 7 and 10), overlap between the channels may cause
unacceptable degradation of signal quality and throughput.
To abide by your local laws, you must select the country where the product will be
installed before activating the Wi-Fi card.
In other words, when using antennas with a gain higher than 6dBi, for every 1 dBi
gain over 6 dBi, the MAX RF output power must be reduced by 1 dB.
When using antennas with a gain higher than 6dBi, for every 3 dBi gain over 6 dBi, the
MAX RF output power must be reduced by 1 dB.
TPC means Transmit Power Control. It’s a mechanism by which 2 devices initiating a
communication will negotiate so that their respective power level is as low as possible,
just loud enough to hear each other.
Some channels require DFS support; see section “Radars detection overview (DFS)”.
After radar detection, the channel is marked as “Radar detected” for a Channel Avoidance
Period (NOP). During this period the product cannot select this channel.
CAC Traffic
Radar detected on
channel A, stop Wi-Fi
service and select
another channel
Two lists of typical radar waveforms must be detected according to ETSI or FCC standards.
Basically, a typical radar waveform is defined by different parameters like:
- Pulse Width
- Number of pulses per radar burst
- Time between pulses (Pulse Repetition Frequency or Pulse Repetition Interval)
- Number of bursts
IV ADMINISTRATION OVERVIEW
IV.1 Web interface
The primary means to fully configure the product is the web browser interface. It is
described in more details in the Web Interface reference chapter.
To get access to the product you may have to set its IP address first, this is done using either
the Acksys WaveManager software.
You can use any recent browser except Microsoft Internet Explorer 11.
V TECHNICAL REFERENCE
V.1 Networking components
V.1.1 OSI model
The discussion of the networking features will often refer to the Open Systems
Interconnection (OSI) model. It is a conceptual view of communications systems
standardized by the ISO. Please refer to
http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html or other resources for
further explanations.
This user guide focuses on the three lower layers of the model: physical, data link and
network.
The Network (IP) address solves this problem by defining addresses which can be subject
to routing. When the source and destination devices are not on the same LAN, the source
device can send data to an intermediate router (also called gateway). The router has
routing tables which allows it to forward data to the destination device, maybe through
other gateways.
The transport layer address, called a “port”, is used inside a destination device to deliver
data to the correct application process.
You can move packets between two physical links depending on their MAC addresses,
without changing the packets: this is called bridging or switching. You can move packets
between LANs by selecting their destination depending on the IP addresses: this is called
routing. Routing offers additional features, like the possibility to masquerade IP
addresses, or to selectively disable routing: this is firewalling.
V.1.7 VLAN
The VLAN (Virtual LAN) concept allows splitting up a broadcasting domain at the data link
layer into several sub-domains, by assigning to each sub-domain a VLAN identifying number,
the VLAN_ID.
VLANs have a number of advantages. They help reduce to a sub-domain the target of
broadcast frames, isolate unrelated hosts which share the same physical network, and allow
bridges to make different forwarding decisions based on VLAN IDs.
Picture V-3: Computers receive only from computers on the same VLAN
V.1.8 Bridge
A bridge is a device that connects two or more 802.1 compatible network segments and
forwards frames selectively. Bridging is done at layer 2 (data link layer) of the OSI model:
frames are forwarded based on their Ethernet address, rather than their IP address (unlike a
router). Since forwarding is done at Layer 2, all layer 3 protocols can go transparently
through a bridge.
Each network segment is connected to the bridge via a port. A port can be a physical or
virtual interface.
The bridge builds an internal list of MAC addresses in use on each attached network
segment. When forwarding a frame, the bridge looks up the destination in its table and
forwards only to the port bearing the address. If the destination address is not found in a
table, the frame is duplicated and forwarded on every port but the originating one.
A bridge can appear as a distinct hardware called a “switch”. Alternately, a router can
embed a “software bridge” which groups several ports in a single layer 2 interface to be
configured at layer 3.
In order to bridge interfaces together, refer to VI.1.5.1 Network configuration and the
Interfaces Settings submenu.
7 77
Picture V-5: Upper layer interface in software bridges
However you can create VLAN interfaces (see above) and plug them on the bridge
ports. This enforces the use of tags, and allows converting from one VLAN to another:
The VLAN interface drops untagged and wrongly tagged ingress frames. It untags
properly tagged ingress frames before forwarding them to the bridge. In the other
direction it tags egress traffic.
b. Bridge-VLAN
In a “bridge-vlan”, each interface has a list of authorized VLANs. VLANs that are not in
this list cannot be forwarded via this interface.
Ingress untagged traffic is dropped and not forwarded by the bridge. Instead it can be
tagged with a configurable Default VLAN_ID, so it can then be forwarded by the bridge.
Egress traffic can be tagged or untagged.
The bridges-vlans are achieved with the BRIDGING / VLAN MANAGEMENT submenu.
Please see: Vlan Management
Incentive
Interconnecting various switch devices and MAC bridges in a LAN may lead to network
loops. For example (see picture below), say you have 3 bridges A, B and C, and there is
a direct (Ethernet or Wi-Fi) connection between A and B, another between B and C,
another between C and A; then when a device connected to A sends a broadcast, it will
be resent by A to B and C, B will resend it to C and C will resend it to A. The broadcast
frame is caught in a loop which will soon take a lot of the available bandwidth resulting
in a so-called “broadcast storm”.
However, loops may be useful to create backup routes when a link fails. See
Operation
When the STP protocol is activated on several interconnected bridges, they will
exchange information to agree upon a unique path to transmit frames from one point
to another.
The bridges will coordinate to set up a tree structure, thus avoiding loops, and this tree
is capable of rearranging automatically when links are broken.
STP should be activated on all bridges participating in a LAN loop. The alternate
protocol RSTP is an evolution of STP that reacts more rapidly to broken links in some
cases, thus accelerating broken links recovery.
Warning: If the bridge contains wireless interfaces, some caution must be taken to
ensure proper functioning of STP/RSTP on these interfaces:
➢ If the wireless interface is an Access Point: The number of clients connected to
this Access Point must be limited to 1.
➢ If the wireless interface is a Client: The Bridging mode must be “4 addresses
format (WDS)” (since ARPNAT cannot handle non-IP STP frames). Please note
that this implies that the roaming functionality is compatible with ST/RSTP only
if set to the Connect before break mode.
b. RSTP overview
RSTP is a network protocol defined in the standard 802.1d that ensures a loop-free
topology in a bridged LAN (With WDS for wireless interface).
It also allows including alternate paths and backup ports in the network topology.
RSTP provides quick recovery of connectivity to minimize frame loss.
Packets named BPDU are used for RSTP negotiation between bridges, and for topology
changes.
Protocol outlines
Root election
RSTP defines the network topology as a Spanning Tree (an inverted tree). It first selects
a Root bridge, from which Ethernet/Wireless connections branch out to connect other
switches.
After the root bridge is chosen, each other bridge in the network will have 2 types of
links:
➢ Upper links: Links leading to the root bridge
➢ Lower links: Link not leading to the root bridge.
Then, each bridge will negotiate with its neighbors to state on which ports are
attached to lower links: the Designated ports, and which ports are attached to upper
links. From these, a single one will be selected as the Root port.
Port roles
If several ports in the bridge have an upper link, to avoid loops, RSTP will define these
ports either as backup if they share the same medium as the root port, or alternate if
they are on a different medium. It does so according to ports performance parameters.
Only Root and Designated ports are allowed to forward packets, Alternate and backup
ports are not allowed to forward.
In case of failure on Root port, RSTP will change an Alternate or Backup port to Root
port.
So RSTP defines 5 port roles for a bridge:
➢ Root
➢ Designated
➢ Alternate
➢ Backup
➢ Disabled (no link).
Port states
To avoid loops during RSTP port role definition, ports are allowed neither to forward
traffic, nor to learn MAC addresses. After assigning roles, ports are allowed to learn
MAC addresses but not yet to forward traffic. Eventually the ports transit to the
forwarding state.
In RSTP, a port has 3 states:
➢ Discarding: It is not allowed to forward traffic.
➢ Learning: It is not allowed to forward traffic, but it is learning MAC addresses.
➢ Forwarding: It is allowed to forward traffic, and it is learning MAC addresses.
Performance Improvements
Convergence speed
To speed up the transition to forwarding state, and so have a functional network,
RSTP defines some performance parameters:
The Edge port type: a port attached to LAN with no other bridge attached. RSTP will
make the edge ports transition directly to forwarding state.
The Point-to-Point link type: a direct link between two bridges (without any
intermediate equipment like a hub between the two bridges). This will help
designated port to transition faster to forwarding state.
The forward delay: The delay to transition Root and Designated Ports to Forwarding
state.
V.1.9 Tunneling
Tunneling is a way to encapsulate data frames to allow them to pass networks with
incompatible address spaces or even incompatible protocols.
Generic Routing Encapsulation (GRE) tunnels are tunnels that can encapsulate
unicast/multicast traffic.
GRE creates a bidirectional tunnel between a pair of endpoints (network devices). The
source point encapsulates the packets and redirects them to the destination point that will
de-encapsulate them, so the GRE tunnel will behave as a virtual point to point link.
The source and destination point are configured via a GRE virtual interface on each side of
the GRE tunnel. Each GRE interface contains the IP address of the other side of the tunnel.
Packets that need to be encapsulated and delivered to some destination (payload packets)
are encapsulated in GRE packets, then the GRE packet is encapsulated in some other
protocol (the delivery protocol) and then forwarded.
The protocol type of the payload packets can be one of ETHER TYPES (see RFC1700).
WaveOS supports IPV4 as delivery protocol.
GRE tunnels are stateless, they cannot change the source endpoint interface to down, if
the destination endpoint is unreachable.
WaveOS supports layer 2 tunneling over GRE by bridging the physical interface with a
GRE tunnel interface.
Layer 2 tunneling over GRE can be configured with the VIRTUAL INTERFACES/L2
TUNNELS.
Please see: VI.1.4.4 L2 Tunnels
IP routing
The set of all the LANs that can communicate together by means of routers is an
“internetwork”; the Internet itself is an example of such concept. Routers themselves are
nothing more than a computer equipped with several network connections and used
specifically to route packets.
Here is the path followed by a data packet traversing 2 routers. The source and destination
IP address never change during the transit, contrary to the MAC addresses which change at
each routing point.
Computer 1 Computer 2
Application Application
Transport Transport
layer layer
Router 1 Router 2
On WaveOS, routing is implied when several network interfaces are configured. It can be
tuned further in the ROUTING/FIREWALL submenu. Please see: Routing / Firewall chapter.
No MAC address
No MAC address
Ethernet hub
chaining
MAC: 00:01:02:af:19:01
MAC: 00:01:02:af:19:01
Twisted pair
Ethernet cable MAC: 00:01:02:af:19:01
Another way to specify a netmask is to indicate the number of ‘1’ bits, assuming they all
are the most significant. For example, in 192.168.1.0/24 the /24 part means netmask
255.255.255.0
Example: Class C network address and netmask
1 1 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1 0 0 0
193 168 1 200
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0
255 255 255 0
Historical usage has named Class A network the networks 1.x.x.x/8 to 127.x.x.x/8; Class B
the networks 128.0.x.x/16 to 191.255.x.x/16; Class C the networks 192.0.0.x/24 to
223.255.255.x/24.
A host part with all bits set to 1 is the broadcast address, meaning “for every device”. A
host part with all bits fixed to 0 addresses the network as a whole (for example, in routing
entries). Addresses above 224.0.0.0 are used for multicast addressing.
L
Internet A
Gateway Gateway
#1 #2
10.1.2.1 192.168.1.25
When several routers are available on a single LAN to access various remote LANs, the
network devices on the LAN should know about each router’s own address and the
remote network addresses they lead to. Usually one of the routers is designated as
“default”, the other ones are treated as exceptions to this default route.
Default
gateway Internet
10.1.2.1
Subsidiary’s LAN
192.168.1.x/8
Network devices often use the DHCP protocol to get their IP address. The DHCP server
may provide the address of the local router at the same time. To set your Acksys product
as DHCP client, please refer to section VI.1.10.1 DHCP Server.
network. This so-called “dense mode” is simple but it takes a lot of network
resources and is not scalable. Usually, there are only a limited number of receivers,
this is called “sparse mode”. Two features are required to limit the traffic:
➢ The receivers must advertise their will to receive
➢ The intermediate routers must build an optimal distribution tree, e.g. only one copy
of the data is sent to a router on the same LAN than two receivers, and only one
router distributes a multicast flow on one given LAN.
V.1.13.1 Multicast addresses
A multicast address is usually called a “group” since it does not point to any specific
location in the network.
a. Ethernet Data link layer
On Ethernet compatible networks (which includes Wi-Fi), group addresses have the
least significant bit of the first byte set to 1 (this is the first bit to be transmitted in a
frame). In this sense the broadcast address is also a multicast.
b. Network layer
IPv4 reserves all 32-bits addresses beginning with binary “1110” for multicast. This
covers the group range 224.0.0.0 to 239.255.255.255.
Groups in the range 224.0.0.0 to 224.0.0.255 are reserved for LAN delivery, and cannot
be routed outside a LAN.
c. Conversion between layers
When a IP multicast is sent out on an Ethernet network, in order for the Ethernet to
multicast the frame, the IP group is converted to an Ethernet multicast address.
IPv4 groups are converted to “01:00:5E:” + 23 lower bits of the group.
IPv6 groups are converted to “33:33:” + 32 lower bits of the group.
Hence, two different groups may be received by a device expecting only one of them.
The receiving network layer must filter out unexpected groups.
V.1.13.2 PIM-SM
WaveOS implements the Protocol Independent Multicast – Sparse Mode (PIM-SM) to
establish the routing tables required for multicast traffic. PIM must run on all the
intermediate routers between the data sources and their receivers. The main features
of PIM-SM are:
- Manage “rendezvous points” (RP) routers, which are the central distribution points
for any given multicast flow
- Identify and manage local multicast sources
- Identify local receivers
- Find routes for multicast flows
- Manage multicast routing tables
- Handle rendezvous points redundancy
- Handle routers redundancy
a. Routers redundancy
When several multicast routers are available on a local network, they automatically
negotiate and elect the “Designated Router” (DR) that will process multicast for this
network. Periodical messages ensure the detection of the DR failure to trigger a new
election.
b. Local sources management
Multicast sources need no protocols to trigger multicast distribution. They just send
out their data. Switches and bridges forward multicast traffic to both the local self-
advertized receivers and local routers.
c. Local receivers management
Initially, routers do not deliver multicast traffic on local networks until a local receiver
advertises itself by broadcasting an “IGMP join” message. This triggers routing of the
requested multicast flow from the outside world to the local network.
To account for possible receiver failures and IGMP frames losses, the multicast router
periodically sends an “IGMP global query” to refresh its knowledge of local multicast
receivers.
Intermediate switches and bridges in the local network may optimize local multicast
traffic by using “IGMP snooping”. For this purpose, they may issue “IGMP global
query” themselves. These messages differ from the routers’ in two points:
- Their source IP address is 0.0.0.0
- Based on this address, receiving bridges do not account the originator as a
multicast router, and so will not forward multicast data to it.
When all local receivers cease to respond to queries for a group, the router stops
forwarding this group on the LAN.
d. Rendezvous points functions
To avoid configuring each router in the network with each possible source for a
multicast flow, each multicast group is assigned one multicast router known as the
“rendezvous point” for this group.
Data from a multicast source is encapsulated and sent (tunneled) by the local router
(the sender’s DR) to the rendezvous point in unicast.
Requests from receivers are routed by the multicast routers to the rendezvous point.
After initial communication establishment, the rendezvous point may optimize the
path, ensuring that the multicast traffic will flow directly from the source to the
destinations.
e. Rendezvous points selection
Any multicast router can be designated by static configuration as a rendezvous point
for a group. After that, other routers come to know its existence by either:
- Static configuration in the other routers
- Dynamic negotiation with the BSR (Bootstrap router).
For redundancy, several rendezvous points may serve the same group. Priorities can
be enforced, and in the event of equal priorities, an algorithm ensures that the same
rendezvous point is used by all routers.
f. BSR election
When rendezvous points are set up dynamically, a Bootstrap Router (BSR) is
designated to broadcast periodically the table of currently active rendezvous points.
Any multicast router can be designated by static configuration as a BSR for the
network. For redundancy, several BSR may be defined with various priorities. In this
case they will elect a master BSR automatically.
g. Multicast route selection
When routing unicast, the router receives a packet, extracts its destination address and
forward depending on the destination. On the contrary, when routing multicast, the
router receives a request for a group which is converted to a source address (the one
of the rendezvous point). The router must make the request travel in the reverse path
toward the source. This is known as Reverse Path Forwarding (RPF). Routers which are
on the path of the request set their forwarding tables so that multicast data will travel
in the opposite direction.
Several routers may exist on any given LAN; a Designated Router (DR) is elected so that
the LAN will not receive duplicate packets for the same group. Also, PIM checks and
prunes redundant routes between routers.
Solution: pay attention to set the sender IP address in the same subnet than the DR,
and either to associate the group address with a local network interface, or to have a
DR on the same LAN than the default unicast router.
c. Small TTL
Multicast traffic has the capability to flood the network. In order to limit the potential
for mistake,
Most standard multicast senders use a default TTL of 1
This is specially the case with software commonly used for network tuning and testing,
like Videolan VLC, IPERF and JPERF.
According to the IP protocol, the TTL parameter constrains the number of local
networks that a packet can cross. Hence TTL=“1” means “only local delivery”.
Solution: configure the sending software so that it uses a larger TTL.
The minimum value must take into account the shortest path between source and
farthest destination, going either through the RP or directly.
Setting incorrect values will result in packets silently dropped by a certain router along
the distribution path.
d. MTU and DON’T_FRAGMENT option
This one is not specific to multicast but is prominent is this case, because UDP is
generally used. If a packet is larger than the MTU of any subnetwork in the distribution
path, the relevant router must fragment it. However,
Most senders default to using the IP Don’t Fragment flag
This is specially the case with the Linux kernel, and consequently all application
software running under Linux, if they do not provide a means to reset this IP option.
Using large packet sizes will usually result in packets silently dropped by a certain
router along the distribution path. Often it will be the sender’s DR since it must
encapsulate traffic to the RP, thus reducing the MTU.
Solution: configure applications to use the maximum frame size that do not need
fragmentation; or configure the sender to clear the Don’t Fragment flag.
e. Wireless slow multicast traffic
The 802.11 infrastructure mode is asymmetric by essence. When an Access Point sends
data to a station, it uses a data rate appropriate for this station. When it sends to many
stations as in multicast, 802.11 states that:
the AP must send multicast using the lowest rate available,
which is 1 or 6 Mbps depending on the radio band.
When a station sends multicast frames to the AP, it uses the best rate, but in order to
make the frame available to other stations, the AP immediately re-broadcasts the
frames at the lowest rate.
This results in
- very slow multicast traffic over Wireless,
- great waste of bandwidth for other traffic.
Solution: Make multicast traffic pass the wireless link while encapsulated in a tunnel.
This can be for example a GRE tunnel configured for this purpose, or you can take
advantage of the encapsulation between the sender’s DR and the RP (in which case
you must forbid the RP to switch to the shortest path, which would bypass the tunnel).
f. Wireless transmitting traffic permanently
The radio channel is a sparse resource. On another hand,
the multicast sender blindly sends to its DR,
and this DR quite blindly sends to the RP (except that the RP can request a temporary
suspension when it has no receivers).
Solution: the path between the sender and its DR should not cross a wireless LAN.
The path between the sender and its RP should not cross a wireless LAN, though this
requirement is less stringent. If you refer to the previous pitfall item, an optimal
system has the sender and the RP on the same side of the wireless LAN, and use a
GRE tunnel to transfer multicast data to the other side.
g. Wireless transmitting unwanted multicast traffic
An Access Point connected to an Ethernet segment conceptually extends the
Ethernet to the associated stations.
Unwanted multicasts reaching the AP from the Ethernet will be
forwarded to the stations at very low speed, wasting bandwidth.
In WaveOS this can occur if the AP is added to a bridge together with other
interfaces.
Solution: if you know in advance that no wireless station is interested in some
multicast group, you can set bridge filters to forbid outgoing multicast traffic. See
Bridge filter in the web interface chapter.
h. Access points and multicast routers
When the multicast router starts it enumerates the available network interfaces.
If one of them is an access point, it may be that this AP is not yet started because it is
configured to search for a channel (ACS function) or because the chosen channel is
subject to DFS delays (CAC or NOP). In this case the multicast router cannot establish
various negotiations, and this network interface will stay ignored forever.
Access point are delayed by ACS and DFS
Solution: Put the AP all alone in its own bridge. The multicast router will consider that
the bridge itself is available, whatever the AP state.
i. Long delays at startup
While running, the multicast router reacts to various events in a timely manner.
However, users will go through unexpectedly long delays when WaveOS starts up.
V.1.14 Firewall
Network interfaces can be conceptually grouped into “zones” in order to assign common
administrative policies to them. Firewall
The firewall permits to set rules that are applied to each packet, and that decides if a packet
must be forwarded or blocked.
In WaveOS, the firewall feature can be tuned in submenu: ROUTING/FIREWALL/NETWORK
ZONES
Please see: Firewall
10.100.0.1 10.100.0.2
Same address
space
In the case of a NAT/PAT router, the network is split in two “zones”: the public zone
which is materialized by the backbone, and where a central administration gives out
“public” IP addresses; and the private zone where the administrator can assign IP
addresses without the knowledge of IP addresses outside.
Then the NAT/PAT router changes all outgoing (from private to public) IP datagrams to
masquerade the source private IP address into its own unique, public IP address. It also
changes the incoming (from public to private) IP datagrams replacing the destination
address, which is the router’s public address, to the private IP address of some device in
the private network. In order to keep offering a wide address space as seen from the
public side, the NAT/PAT router uses port numbers as extensions to the IP addresses.
Hence, the NAT/PAT mainly works with UDP and TCP; it cannot handle generic ICMP
routing, but only towards one private device at most.
The NAT/PAT router must manage incoming connection calls as well as outgoing
connection calls. It uses two main conversion tables:
• A configurable table which assigns a private destination IP to selected destination
ports in the incoming calls
• An internal conversion table which tracks which ports are assigned to which (private
IP, private port) couple for outgoing datagrams.
Due to the various processing involved, the performance of a NAT/PAT router is lower
than the performance of a regular router, which is lower than the performance of a
simple software bridge.
Now if we want to add access to the whole 192.168.1.0 subnet and reach a unique
192.168.2.0 subnet address, we just need to add the virtual addresses and define the
proper translation rules. However, it will be necessary to create on the destination
interface an alias of the IP address of the product for each of the subnets, in order to be
able to define the return path, via static routes, or default gateways.
The infrastructure mode provides central connection points for WLAN clients and the AP
may also bridge them to a wired network. Prior to any communication, the client must
join the WLAN (wireless LAN) by selecting one access point, authenticating and possibly
establishing encryption keys.
The AP and its associated clients form a Basic Service Set (BSS) identified by a BSSID, in
the form of a MAC address automatically forged by the AP. More APs can be added to the
WLAN to increase the reach of the infrastructure and support any number of wireless
clients. The whole WLAN is identified by the SSID, a string of 1 to 32 bytes, usually a
human-readable text. All wireless stations and APs in the same WLAN must be configured
to use the same SSID.
The APs in the WLAN are then cabled to a common wired LAN to allow wireless clients
access, for example, to Internet connections or printers.
Compared to the alternative ad-hoc wireless networks, infrastructure mode networks
offer the advantage of scalability, centralized security management and improved reach.
Since the 1.4.2 revision, the firmware implements the “clients isolation” feature which
allows the AP to block communication between clients. In this case product A will be able
to communicate with product B and the “local network” but not with product C
(according to the figure below). Product C will also be able to communicate with product
B and the “local network” but not with product A. The picture shows the access point
behavior with and without the Separation Client option.
In the infrastructure mode concept, a client is supposed to be a single unit. However the
wireless client can bridge several Ethernet devices to a BSS towards the AP, and it still
appears as only one device, by converting MAC addresses on the fly (see section V.2.6
Wired to wireless bridging in infrastructure mode).
V.2.1.2 Ad-hoc Mode
On wireless computer networks, ad-hoc mode is a way for wireless devices to directly
communicate with each other. Operating in ad-hoc mode allows all wireless devices,
within range of each other, to see each other and communicate in peer-to-peer fashion
without involving central access points (including those built into broadband wireless
routers).
To set up an ad-hoc network, each wireless adapter must be configured for ad-hoc mode
(as opposed to the alternative infrastructure mode).
In addition, all wireless adapters on the ad-hoc network must use the same SSID and the
same channel number.
An ad-hoc network tends to feature a small group of devices in very close environment.
All communicating devices must share the same cell. There is no way to establish a route
in order to link 2 remote products.
Without security, Ad-hoc mode works in 802.11abgn/ac mode.
With WEP security, Ad-Hoc mode works in 802.11abg mode
Ad-Hoc mode does not support WPA/WPA2 security.
Routing protocols
To determine the transmission path between two mesh points, a routing protocol must
analyze the network. 802.11s defines HWMP as a mandatory protocol, and it has
provisions to plug in other third-party routing protocols. ACKSYS devices implement
HWMP.
Security protocols
802.11s networks can use either no security, or the WPA3-PSK (SAE-Personnal) security
described in section V.2.5.7 Mesh Secure Authentication of Equals (SAE). This security is
roughly similar to infrastructure WPA/PSK.
V.2.1.4 Wireless Network Name
This name is also referred to as the SSID and serves as a wireless network identifier.
A service set identifier, or SSID, is a name used to identify the specific 802.11 wireless
LAN to which a user wishes to access. A client device will receive broadcast messages
from all access points within range, advertising their SSIDs, and can choose one to
connect to, based on pre-configuration, or by displaying a list of SSIDs in range and asking
the user to select one.
Devices participating in a Wi-Fi communication must all use the same SSID. When you are
browsing for available wireless networks, this name will appear in the list. For security
purposes we highly recommend changing the pre-configured network name.
The SSID used in 802.11s Mesh mode is called “mesh ID”. It takes the same form as the
infrastructure SSID, but is a separate parameter: if you use the same string for an
infrastructure SSID and a mesh ID, they are considered as two distinct WLANs.
Special caution should be taken when configuring the Repeater to avoid the client
repeater association with the Access point repeater (when they have the same SSID),
which will then generates a network loop.
➔ Set a different SSID on client role and Access point role of the repeater.
Advantage:
No need to reconfigure the repeater if we change the AP_X.
Drawback:
It requires the end users to use multiple SSIDs, as the network extension has now a
different SSID.
Impact on Throughput:
A repeater uses one radio card to perform the 2 roles, Client+Access point, and to
perform the transmissions from AP_X to Repeater, and then Repeater to STA_X (and
vice-versa). Since the repeater, having only one radio card, cannot receive and
transmit at the same time, the throughput is reduced by at least 50%.
Advantage:
Doubles the available bandwidth; also solves the loop problem.
Drawback:
The end users must search several channels for the SSID.
V.2.2 Hardware
The cellular interface is functionally equivalent to the data service in a mobile phone. It
replaces the secondary Wi-Fi interface. It requires one or two antennas; using the second
one improves the quality of communication.
When a third antenna connector is present, it is used for satellite positioning (see next
section about GNSS).
The cellular interface connects to public mobile networks. Doing so requires an account with
an appropriate public operator. The account takes the form of a SIM card installed in the
product. You can install two SIM cards, so that you can choose one operator out of two.
V.2.3.1 802.11b
802.11b is supported for compatibility with old devices. Using it will lower the throughput
for all devices in the radio range, because 802.11b uses a lot of bandwidth for little
throughput.
V.2.3.2 802.11g
This transmission standard works in the 2.4 GHz band (like 802.11b) but operates at a
maximum raw data rate of 54 Mbit/s, or about 20 Mbit/s mean throughput. 802.11g
hardware is fully backward compatible with 802.11b hardware.
V.2.3.3 802.11a
The 802.11na operates in 5 GHz band with a maximum raw data rate of 54 Mbit/s, which
yields a realistic mean throughput in the mid-20 Mbit/s.
V.2.3.4 802.11n
802.11n can operate on either the 2.4 GHz or 5 GHz band. According to the chosen one,
the above notes about range and band saturation also apply.
802.11n also allows using a channel width of either 20 MHz or 40 MHz to double
bandwidth. “HT20” refers to the standard single channel operation; “HT40” refers to the
extended double channel operation.
802.11n hardware may allow transmission of more than one data stream (so-called
“spatial streams”) simultaneously. In order for the streams not to interfere with each
other, the radio signal must bounce on obstacles in various directions, or the antennas
must be polarized. Both cases result in lower range due to power losses, but faster
transmission.
The number of spatial streams must not be confused for the number of antennas.
Furthermore, antennas can be dedicated to emission or reception only. Hence an
802.11n radio specification must include three numbers: number of transmitters, number
of receivers, and number of spatial streams.
In order to automatically adapt to radio conditions, the 802.11n uses various
transmission parameters: number of streams, modulation, channel width and so on. The
resulting transmission format is named Modulation and Coding Scheme (MCS). ACKSYS
products handle 1 to 3 streams depending on the model. Here are the physical bit rates
achievable with one, two and three streams:
Note 1: When the peer station cannot handle short guard intervals, the bit rate is
reduced by about 10%. Guard interval is an 802.11n feature allowing shortening
some idle times during transmission.
Note 2: As can be inferred from the above table, the bit rate is proportional to the
number of streams. A 3 streams radio can transfer up to 450 Mbps.
Note 3: Actual bitrate and throughput depend on the distance between stations,
antennas quality and radio conditions
For detailed information and relationship about MCS, bit rates, maximum
transmit power and receiver sensitivity, refer to the quick start guide
appropriate for each product.
V.2.3.5 802.11ac
Compared to 802.11n, 802.11ac will add the 80 MHz channel size (wider channels
increase speed), the 256-QAM modulation (and therefore 2 new MCS per stream), and
will support 5GHz band only.
Here are the physical bit rates achievable with 1, 2 and 3 streams:
Maximum bit rate (Mbps)
Channel width 20 MHz 40 MHz 80 MHz
1 stream
MCS 0 7.2 15 32.5
MCS 1 14.4 30 65
MCS 2 21.7 45 97.5
MCS 3 28.9 60 130
MCS 4 43.3 90 195
MCS 5 57.8 120 260
MCS 6 65 135 292.5
MCS 7 72.2 150 325
MCS 8 86.7 180 390
MCS 9 n/a 200 433.3
2 streams
MCS 0 14.4 30 65
MCS 1 28.9 60 130
MCS 2 43.3 90 195
MCS 3 57.8 120 260
MCS 4 86.7 180 390
MCS 5 115.6 240 520
MCS 6 130.3 270 585
MCS 7 144.4 300 650
MCS 8 173.3 360 780
MCS 9 n/a 400 866.7
3 streams
MCS 0 21.7 45 97.5
MCS 1 43.3 90 195
MCS 2 65 135 292.5
MCS 3 86.7 180 390
MCS 4 130 270 585
MCS 5 173.3 360 780
MCS 6 195 405 n/a
MCS 7 216.7 450 975
MCS 8 260 540 1170
MCS 9 288.9 600 1300
WPA2 is a more recent and more robust implementation of the stronger IEEE 802.11i
security standard.
WPA3 is the latest implementation which brings better protections to individual users by
providing more robust password-based authentication. This capability is enabled through
Simultaneous Authentication of Equals (SAE), which replaces Pre-shared Key (PSK) in
WPA2-Personal.
Note that there are three versions of WPA3 which are incompatible with each other due
to security vulnerabilities. WaveOS uses the most recent version after August 2019
The cipher type is the encryption algorithm used to secure the data communication.
TKIP (Temporal Key Integrity Protocol) provides per-packet key generation and is based
on WEP.
AES (Advanced Encryption Standard) is a very secure block-based encryption.
You can choose from 3 security options (WPA not recommended):
WPA Mode Cipher Type Security solution
WPA RC4 RC4-TKIP
WPA2 AES AES-CCMP
WPA3 AES AES-GCMP-256
a. Pre-shared key mode (PSK)
In Pre-Shared Key mode (PSK, also known as personal mode), each Access Point client
must provide a password to access the network. The password may be from 8 to 63
printable ASCII characters. Most operating systems allow the password to be stored to
avoid re-typing. The password must also remain stored in the Wi-Fi access point.
All Wi-Fi devices on your Wi-Fi cell must have the same Pre-Shared Key.
b. Enterprise mode (802.1x, RADIUS)
WPA/WPA2-Enterprise, or 802.1x, provides authentication to devices trying to attach to
a private network through a boundary Access Point, establishing the access point as the
gateway to LAN resources, or preventing access from that device if authentication fails.
NOTE: since in a chain of repeaters the farthest ones would depend on the nearest ones
to access the 802.1X server, this security is not available in repeater mode. WPA/WPA2-
PSK can still be used.
The authentication process is organized around several agents:
- User, also called supplicant or Wireless Node (WN),
- Wireless access point or authenticator,
- Authentication server, most often a RADIUS (Remote Authentication Dial-In User
Service) server,
- Authentication modus operandi.
When a wireless node (WN) requests access to a LAN resource, the first step is the
physical association between the client and the access point, defining a so-called “access
port” (number 1 on the diagram).
The access point (AP) asks for the WN's identity. Then it establishes a point-to-point EAP
tunnel between the WN and the authentication server (number 2 on the diagram). No
other traffic other than EAP is allowed until the WN is authenticated (the “port” is closed).
Until authenticated the client cannot access the LAN.
Once the authentication server informs the authenticator that the WN is authenticated,
the traffic to the LAN is allowed (number 3 on the diagram): the “port” is open. Otherwise
the “port” stays closed.
Note: 802.1x also offers a system to exchange keys which will be used to encrypt
communications and to check integrity.
Authentication modus operandi
802.1x uses one of the EAP (Extensible Authentication Protocol) methods. The most
commonly used ones are:
- EAP-PEAP
- EAP-TLS
- EAP-TTLS
The EAP method used is transparent to the access point. On another hand the access
point clients, like bridges, must be aware of the authentication method. The choice of
method must take into account the capabilities of the server/supplicant couple as well
as the level of security needed.
For example, a Windows 10 supplicant allows:
- PEAP authentication with login and password (called MSCHAP V2)
- Use of certificates.
Preauthentication
A client is said to preauthenticate when it is authenticating with a new AP through the
currently associated AP. This aims to speed up the association time when the client
decides to roam to the preauthenticated AP, because it will remove the important
overhead of the 802.1x protocol.
Preauthentication must be enabled in the AP to allow the client to use it. The Client
role in these products always uses preauthentication when offered by the AP.
Pre-authentication makes the client store communication keys before it needs it. The
client can keep many keys in advance, allowing roaming from one AP to another to
another… and back to the first, without re-executing the 802.1 x protocol.
In the client, the keys are kept in a cache table whose lifetime is configurable.
V.2.5.5 Protected management frame (802.11w)
This feature protects your device from a hacker DoS (Deny of Service) attack.
By default, the management frames are not protected. Anyone can send a DEAUTH
frame to a client or to the AP.
In this situation, a hacker can gather AP information using a Wi-Fi sniffer and then send
to a legacy client a DEAUTH frame with the AP mac address. The client receives this
frame, and then closes the connection with the AP.
The 802.11w adds a field in the frame to authenticate the frame sender.
If the Wi-Fi equipment receives a management frame from an incorrect sender, it will
discard the frame.
Please note that with WPA3, Protected management frame is always enabled and
required.
If you choose a WPA2/WP3 mixed mode, WaveOS will automatically set Protected
management to enabled/optional, to authorize the association with WPA2 peers which
don’t support this option.
When using a client station to bridge a wired network to an AP, the situation is different.
What appears to the AP as a single device with a single MAC address (that of the radio
card), is hiding several wired devices, each of them having its own MAC address. Since
they do not participate in the association process to the AP, they did not authenticate,
hence the AP will not accept frames containing their MAC address as a source. If the
client changes the source MAC address to its own, other problems appear, see picture
below.
1) The conversion table handles MAC/IP conversions only. This means that only the
TCP/IP protocols suite (TCP, UDP, IP, ICMP, ARP, DHCP and so on) can be bridged.
2) The conversion table is updated only by frames from the LAN to the Wi-Fi. This is
usually not a problem because prior to any data transfer, a broadcast ARP
request/reply exchange must take place. But if the client bridge is powered down,
when it comes up again, the ARP exchange is not necessarily restarted by the
devices on the backbone side. Then, when the bridge receives a data frame from
the AP, its conversion table is empty and the frame is not forwarded. In this case,
the bridge itself initiates an ARP for the destination IP address mentioned in the
frame, triggering from the LAN device a response that will update the table, so that
the next frame can be forwarded.
3) Equipment on the backbone cannot use an IP gateway (a router or a NAT) located
on the client LAN side, except if the product is the gateway and if the destination
subnet is directly routable by the product. The reason is that the destination IP
address in the frames received from the AP are not the one of the gateway, but
the address of an equipment farther beyond the gateway; but the MAC address
needed is that of the gateway. So, the address conversion is not possible.
4) DHCP is a protocol used to set up IP addresses. The wired device MAC address is
conveyed not only in the DHCP frame header, but also in the data payload. The
address conversion causes an address mismatch at the DHCP server. To satisfy the
DHCP server requirements, the bridge advertises itself as a DHCP relay agent,
resolving the mismatch. For this to work, a DHCP server located on the AP side
must be able to send unicast IP packets to the bridge. This means that the bridge
must have an IP address reachable from the DHCP server prior to serving IP
addresses to the devices behind the bridge.
5) ARP is a protocol used to discover MAC addresses. The ARP frames contain MAC
addresses both in their headers and in their data. Special processing is done in the
bridge to convert these frames.
CISCO and others can set up a “proxy ARP server” in their APs. This means that the
AP itself converts IP to MAC addresses on behalf of the backbone equipment. The
proxy ARP server can get confused because all devices on the bridged LAN appear
to have the same MAC address (the one of the bridge radio card) but different IP
addresses. The solution is to disable the proxy ARP server on the AP side. In the
CISCO product this is called “passive client mode”.
6) More generally, applications or protocols running on the backbone side and relying
on MAC addresses to identify devices, will encounter problems in this mode.
Fortunately, such software is hardly used.
b. Infrastructure client using 4 addresses format (WDS)
When the client is in 4 addresses format bridging mode, it uses a special frame header
where both Wi-Fi and LAN MAC addresses are indicated. This is called the “4-addresses
frame format”. By conveying both the client MAC and the wired device MAC in the
wireless frame, the client can correctly route Wi-Fi frames to its LAN while the AP can
know that it sends to an authenticated client.
In this solution to the bridging problem, the client bridge and the AP encapsulate both
data and Ethernet MAC addresses in the Wi-fi frame, adding both the AP and the client
Wi-Fi MAC addresses. So, the frame can reach its Wi-Fi destination, which removes the
Wi-Fi addresses and retrieves the original frame unchanged. The same process takes
place both ways.
This solution is independent of the layer 3 IP addresses:
1) This mode can bridge protocols other that TCP/IP.
2) It transfers DHCP and ARP frames unchanged, avoiding most verification issues
on the AP side, like proxy ARP or DHCP servers.
3) It allows using an IP gateway either on the AP side or on the bridge side,
accessible from either side.
But since this solution relies on unspecified 802.11 features, is should be used only
between products of the same brand or range, or when you know that the AP and
client use compatible software.
Please note that 4-addresses frame format is not compatible with the roaming feature.
Final note: The 4-addresses frame format is sometimes called WDS (wireless
distribution system). This acronym designates a frame format that can be used in a
variety of ways. It does NOT designate a specific Wi-Fi architecture (like infrastructure
or mesh).
Configuration
The access point role (AP) always supports both standard ARPNAT and 4-addresses
clients simultaneously. The client bridges can be set up either in ARPNAT or 4-
addresses format.
c. Cloning
The ARPNAT solution loses the MAC address information from the wired devices when
bridging frames to the wireless interface. Most devices do not care about MAC address
substitution because they use the IP protocol in Layer 3 and ARPNAT takes care of IP
addresses.
But some devices do not use IP in layer 3 (PROFINET equipment, LAN video camera…)
and the MAC address is the unique ID identifying the equipment correctly.
With the cloning feature, the product can use the MAC address of a wired equipment
as the source MAC address on the wireless interface. The cloned address is used for all
wireless transactions: association, authentication and data exchange. The original MAC
address of the radio card is ignored.
To set up the wireless MAC address, the product clones the source MAC address from
the first incoming frame after a reboot or the configured MAC address. So, there
should be only one device connected to the LAN of the product.
If you mix the non-IP device with other IP devices, you must ensure that the non-IP
device will send the first frame after the product is turned on, to be sure the product
will clone the correct MAC address. To avoid this problem with a PROFINET equipment
you should use the “PROFINET cloning”, in which case the first PROFINET frame source
MAC address will be used for cloning.
To enable proactive roaming the client must search for APs while it is already associated
and potentially exchanging data. This process is called “background scan” and somewhat
reduces data throughput.
Configuration
You must configure the radio signal level threshold at which you consider that the link
quality is insufficient for your throughput requirements.
But radio signal reception level is not a stable measurement; it varies under many
unforeseen parameters (moving objects, humidity…). When the AP signal is near the
threshold, it can go back and forth around the limit. You do not want to switch from AP to
AP too often, since this means you cannot transfer data during these reassociation
periods. To account for this, crossing the limit is subject to a hysteresis called “required
level boost” (default: 6 dB).
Finally, even when the threshold is crossed, you do not want to reassociate with a worse
AP, but you do not want to lose the current bad AP either. The “required level boost”
configuration parameter specifies how much better you want the new AP to be in order
to begin reassociation.
The effects of the various parameters are shown in this picture.
Radio signal
Roaming not needed
time
Current AP roaming roaming takes
Next AP requested place
NOTE: the threshold hysteresis is configurable in versions 2.2.7 and later. The
“leave threshold” is called “minimum level” in earlier firmwares.
If the failure is short-lived, data is retransmitted, and a few missing beacons is allowed.
Conversely, long-lived absence of beacons or data acks triggers a disconnection. If
another AP previously detected is still around, the client will switch to it; else the client
will enter reactive roaming. To properly distinguish short-lived from long-lived failures,
this process is reacting more slowly than proactive roaming, depending on your
configuration.
Configuration
On the client side you can configure the number of missing beacons that will trigger the
roaming process. The delay will depend on the beacon frequency that was configured in
the AP. Please bear in mind that losing a frame or two is very common in Wi-Fi, and the
missing beacons count should not be set below 3.
On the AP side you can set the beacon interval. The smaller the interval, the faster
failures are detected; but beacons are transmitted at the lowest allowed bit rate, and
consume more bandwidth than data frames.
V.2.7.4 Scanning
Scanning is the process used by the client station to find the APs around, in order to
associate with one of them. Scanning takes place periodically. During each period, the
client will successively switch to configured scan channels, send a broadcast “probe
request” frame and wait for responses.
The probe request contains the SSID among other data. Any AP capable of serving this
SSID will answer. The signal quality at which the response is received is used to select the
best AP.
When the scanned channel is not the one of the current AP, the client is said “off-
channel” and it cannot transmit nor receive data during this time; the data is buffered
meanwhile. To inform the AP that it cannot receive, the client sends a “power save
mode” indication to the AP before going off-channel, so that the AP can buffer frames in
the meanwhile. Configuring too many scan channels will result in loss of throughput
and/or loss of data. To allow sufficient time for buffered data to flow out, you can
configure the delay between two scan periods.
Configuration
The two scan parameters are the list of scan channels and the delay between scans.
Warning! This delay is not the scan period, but increases the scan period, as shown in the
following diagram, showing the background scan (C parameter).
NOTE: when the client is not associated to any AP (after a client restart, or if the current
AP suddenly disappears), there is no data to exchange, hence the breath time “R” in the
diagram is shortened to 0, resulting in a slightly faster scan cycle.
Scanning itself normally takes place unconditionally. To gain extra throughput when the
signal level is good, you can configure a “scan threshold”. This parameter sets the signal
level above which you estimate that no roaming is ever necessary. Setting the “scan
threshold” to zero disables this feature (default).
When set, the scan threshold is compared to the power received from the current AP.
When the power is greater than the threshold, the scan process is stopped at the next
scan period. When the power received is lower than the threshold, the scan process is
restarted.
To avoid oscillation effects due to a received power rapidly changing around the
threshold, a hysteresis is implemented. Its value is the same as the hysteresis used for the
“leave threshold”.
Radio Scanning disabled
signal
Scan Threshold
threshold Hysteresis
(configu- (configurable)
rable)
Scanning
enforced Scanning
enforced
Leave
threshold
Train
In this case when the AP is seen with a high signal level it is likely that the client will
lose the association in the next few seconds.
The Excessive signal detection threshold parameter drives the decision of dynamically
leaving the current AP when its level becomes too high. The Maximum signal level
parameter drives the static elimination of APs with high signal level as candidates for
the next association; the check is performed after each scan.
Good stability places some constraints on these parameters:
• When both parameters are used, you must set the threshold level lower (less
powerful) than the max level.
• These parameters are incompatible with the Current AP scan threshold, which
is another way of managing high signal level APs.
• The excessive threshold also uses the Threshold hysteresis parameter
• The max level is not checked during the first scan after association, to avoid
leaving an AP which just became current.
Configuration
0
AP1
-10 AP2
Maximum signal
-20 AP eliminated from candidate list AP3
level
-30
Excessive signal
detection threshold
-40
-100
AP eliminated from candidate list
At the end of scan process, the product chooses a candidate AP. The candidate AP is
the AP where you will roam if the roaming is requested.
Roaming won’t occur before the Minimum roaming interval has elapsed since the last
association. In areas where several APs are received with about the same signal
quality, this parameter helps avoid frequent roaming due to slight signal variations.
Roaming won’t occur to an AP that was left recently before the No-return delay has
elapsed. This parameter helps enforce roaming to a sequential succession of APs, even
if signal bounces make a previous AP appear temporarily as more desirable.
The smoothing factor is a value between 0 and 1 in steps of 1/16 th. For example, a
value of 3/16 means that the signal power levels of the previous beacons are used like
this:
3
• for the most recent beacon, = 18.75% of the signal value,
16
3 13
• for the penultimate beacon, × = 15%,
16 16
3 13 13
• for the antepenultimate beacon, × × = 12%,
16 16 16
• and so on.
Configuration
In the browser interface the factors are expressed as the percentage attached to the
last beacon. As an extreme case, using 100% (or 16/16th) means that only the most
recent beacon is used in the comparisons.
c. Off-channel configuration
You can shorten the duration of the off-channel probe request/response sequences
(the ‘B’ parameter in the “scan period” picture). This solves the situation where a large
data flow is entering the AP which cannot forward it to the client because it is scanning
another channel, and the AP has insufficient buffers. The ‘B’ delay is the sum of (B1) a
switching delay (very quick), (B2) a synchronization delay (ensuring that our probe will
not collide with another transmitter on the channel), (B3) probe request transmission
(at the lowest rate available), (B4) response waiting delay.
Also, the scanner can switch from channel to channel, without returning to the current
channel. In the next picture, 5 channels must be scanned. During one scan sequence
‘B’, the delays (B2)-(B3)-(B4) are repeated without returning to the data channel, until
either the parameter “Maximum time off-channel” or the current AP beacon interval is
exhausted. This behavior saves some of the switching delays (B1) and improves mean
throughput at the expense of the instant throughput.
Configuration
You can configure items (B2) with the “Offchannel adaptation delay” and (B4) with
“Per channel probe response delay”, and you can define the overall off-channel
duration of one ‘B’ scan sequence with the “Maximum time off-channel” parameter.
All these parameters are defined ±4 ms.
Default values
The default parameters allow probing 2 channels per scan sequence, as displayed in
the picture. The default “maximum time off-channel” is 125 ms, but since most AP
have a beacon period of 100 ms, this parameter is usually automatically reduced to
100 ms. The two other default parameters are set to 30 ms, but are actually rounded
down to 28 ms.
If the channel list includes DFS channels, the delay indicated in "Maximum time off-
channel" must take into account the minimum value of "Per channel probe response
delay" in the DFS case.
To scan the 2 channels consecutively, you can set "Offchannel adaptation delay" = 30
(rounded to 28); "Per channel probe response delay" = 30 (rounded to 28); "Maximum
time off-channel" = 200 (i.e. 138 + 56 + 6 ms of margin), the scan cycle will then be:
channel 36 (approx 56 ms) then directly channel 52 (approx 138 ms) then "Delay
between two successive scan cycles" and we start again.
The table below gives the number of frames vs the security level
Security policy Number of frame
Open (without security) 4 frames
- 4 Authentication frames
4 frames
WEP
- 4 Authentication frames
8 frames
WPA/WPA2-PSK - 4 Authentication frames
- 4 Key exchange frames
> 8 frames
WPA/WPA2-EAP (with radius - 4 Authentication frames
server) - Several radius authentication frames
- 4 key exchange frames
Step 1: The Wi-Fi client associates with AP1 for the first time. In this step the client
does a full authentication. The radius server sends the PMK to both AP1 and
the Wi-Fi client. AP1 and the Wi-Fi client store the PMK in their local cache.
At the end of this step, the Wi-Fi client is connected to AP1
Step 2: The Wi-Fi client discovers AP2 by scan process. It uses the secured link with AP1
to process a pre-authentication with AP2. During this step, the radius server
sends the PMK to AP2 and the Wi-Fi client. They both store the PMK in their
local cache.
At the end of this step, the Wi-Fi client is still connected with AP1.
Step 3: The Wi-Fi client roams to AP2. Both AP2 and the Wi-Fi client check if the PMK in
their local cache is correct.
If the PMK is correct, AP2 starts the WPA handshake with the Wi-Fi client.
If the PMK is not correct, the AP starts a radius authentication.
At the end of this step, the Wi-Fi client is connected with AP2.
Step 1: The Wi-Fi client does a full authentication with AP1. AP1 stores the PMK and
temporally keys. This full authentication process produces data that will be stored by
the Wi-Fi client for the next step.
Step 2: The Wi-Fi client roams on AP2 and uses data stored in the previous step in its
authentication request. With these data, AP2 knows that this Wi-Fi client is
successfully authenticated with AP1. AP2 directly requests the temporally keys from
AP1 (using the back bone). If AP1 gives all the needed keys to AP2, the Wi-Fi client is
allowed to finish the association process with AP2. In the other case, the Wi-Fi client
starts a full authentication with AP2.
The idea is to reject APs whose signal level decreases. They are supposed to be passed by
the vehicle. More precisely, PLH rejects APs whose signal level is lower than one of the
preceding values, without time limit as long as the AP remains visible.
In addition, APs whose signal is too high are rejected, on the assumption that they are
very close to them and that the overrun is imminent.
The idea is to reject APs whose signal increases. More precisely, PLH rejects APs whose
signal is greater than one of the preceding values, without time limit as long as the AP
remains visible.
In addition, APs whose signal is too high are rejected, on the assumption that they are
very close and potentially still on the rear lobe.
"Emergency" state
Here is the list of tests that condition the state of emergency:
o There is no active interface yet OR
o the active interface is not associated OR
o the signal level of the active interface is lower than the emergency threshold OR
o we are in a rear lobe condition: FRONT= active AP almost reached or exceeded;
REAR= active AP is approaching. (Normally, in these cases we should have
switched to the other radio. If this is not the case, the other radio does not have a
satisfactory connection).
The emergency state can be consulted using SNMP OID statusRoamingUrgent
o IP address Availability: This IE provides clients with information about the availability
of versions and types of IP addresses that could be assigned to these clients after
they have associated with the AP hotspot
o NAI Realm: The NAI Realm profile of an AP identifies and describes an NAI (Network
Access Identifier) domain reachable using the AP, and the method that NAI domain
uses for authentication
o 3GPP Cellular Network Data: Defines information for a 3rd Generation Cellular
Partnership Project (3GPP) network for hotspots that have roaming relationships with
cellular operators
o Connection Capability: Define the hotspot protocol and the port capabilities to send
in an IE ANQP.
o Operating Class: Use this profile to define the channels on which the hotspot is able
to operate
o Operator Friendlyname: A free text field that can identify the operator and can also
give information about the location
o WAN Metrics: Provides hotspot clients with information about access network
characteristics such as link status and the capacity and speed of the WAN link to the
Internet
V.2.9.3 Passpoint Profile Types
In order to facilitate the configuration of a Passpoint, the configuration is stored
separately and is (almost) independent of any wireless interface. The configuration
consists of several Passpoint configuration profiles; the options in each Passpoint
configuration profile share the same purpose.
The Passpoint configuration profile can be summarized in 2 types: HS20 profile and ANQP
profile. HS20 profiles configure hotspot 2.0 functionality while ANQP profiles configure
ANQP 802.11u functionality.
You will find the description of the different configuration profiles in the Setup menu
section (Passpoint Config Profiles). Note that the information necessary to fill in these
different profiles must be given by the service provider
Profil Description
HS20 Operator Friendly Name Use this profile to define the friendly name sent by
devices using this profile
HS20 Connection Capability Use this profile to specify the hotspot protocol and port
capabilities
HS20 WAN Metrics Use this profile to specify the WAN status and link
metrics for your hotspot
HS20 Operating Class Use this profile to specify the channels on which the
hotspot is capable of operating
HS20 OSU Provider, Passpoint Icon Use this profile to define an OSU provider
ANQP Venue Use this profile to specify the location group and type of
locations to send in an IE ANQP in a GAS request
response.
ANQP Roaming Consortium The IEs of the Roaming Consortium contain information
identifying the network and the service provider, whose
security credentials can then be used to authenticate
with the AP that transmits this element
ANQP Network Authentication Type If the network has Additional Step Required for Access
(ASRA), this profile defines the type of authentication
used by the hotspot network
ANQP IP Address Availability Use this profile to specify the types of IPv4 and IPv6
addresses available in the access point network.
ANQP Domain Name Use this profile to specify the domain name of the
hotspot operator
ANQP 3GPP Cell Net Use this profile to set priority information for a 3rd
Generation Partnership Project (3GPP) cellular network
used by access points that have roaming relationships
with cellular operators
ANQP NAI Realm The NAI Domain Profile for an AP identifies and
describes a Network Access Identifier (NAI) domain
accessible using the AP, and the method that NAI
domain uses for authentication
ANQP Override Element Additional ANQP elements with arbitrary values can be
defined by specifying their content in raw format as a
payload hexadecimal. Note that these values will
override the contents of ANQP elements that may have
been specified in higher layers of the configuration
parameters.
Internet
Data Center
Two important features must be dealt with when using cellular communication:
▪ Privacy: communication between the products and your data center goes in a first
step through the air (with very light privacy) and/or through the Internet in a second
step, with equivalent issues. To achieve acceptable privacy, we recommend to set up
an encrypting VPN between the product and the data center (even if the operator
provides privacy on a part of the path).
▪ Providing access to local devices: if other devices on the product’s LAN are to use the
product as a router to Internet or the data center, you must cope with the operator’s
intermediate NAT. Indeed, the operator’s NAT does not know how to route the local
devices addresses received from remote sources. You must set up a NAT on the
cellular (public) interface of the product to get around this issue.
V.3.2 Configuration
In order to enhance security at installation time, the cellular interface is disabled by default,
so you must remember to enable it. Most of the low-level configuration is provided by the
SIM module.
Other than that, you must decide if you need to set up a NAT and/or a VPN.
Without a VPN, you probably need a NAT to allow the devices on the Ethernet or the Wi-Fi
link to gain access to the Internet. If you use a VPN, having a NAT or not depends on the
addressing scheme you use at both the local and the remote ends of the VPN.
You can put the cellular interface into a network zone in order to set extra firewall rules.
Normally the cellular interface becomes the default route when the connection is
established, and the configured DNS servers are replaced by the operator-provided ones.
These behaviors are generally required but can be disabled.
The string displayed in the system log and the string obtained through the ‘gnssAllPositions’
SNMP OID have the same format. It consists in a series of column-separated values in the
following order:
So, in the master router, the VRRP service detects hardware failures, in the slave, it also
monitors the master’s health.
Note that the backup can detect the presence of the master, but the master cannot
detect the presence of an inactive backup. This is very important because, if the network
hardware is only half-functioning (for example the Ethernet link of the master can receive
frames but not send them), the system could end up with two active routers at the same
address (the master sees no default, and the backup becomes active since it receives no
advertisements from the master). The solution to this is instance grouping.
The duration between failure and take-over by the backup depends on many parameters:
o Time to detect the failure (1 to 2 seconds for an Ethernet linkdown, depend on
roaming parameters for Wi-Fi failure)
o Advertisement interval. The backup waits up to 4 times the interval before taking
over
o Time to reload the connections in the backup (a few ms)
o Time to broadcast the “gratuitous ARP” frame to the network so that switches and
hosts know the new MAC address associated to the gateway IP address
o Traffic load. A high network traffic may slow down noticeably the take-over.
VRRP Instances
A VRRP instance is the entity that manages one gateway IP address in one router. It is
bound to one subnet.
By this definition, a VRRP instance has the following properties:
• ID a virtual address identification number, common to the
master and the backup. The ID associated to an IP must
be unique on the subnet (in case you have several distinct
gateways using VRRP)
• Virtual IP address The address managed by the instance. It must be
different from any other IP address assigned to the
device, either static or DHCP-provided
• Netmask Routing information for the virtual IP address
• Network interface The physical (Ethernet…) or logical (bridge…) subnet to
which the virtual IP address is bound
Several other properties are inherited from the group the instance belongs to: the
priority (in backup state), the master advertisement period (in master state) and the
initial state.
A network interface can be bound to several IP addresses. Typically, one is static and is
used for management purposes (to configure and monitor the router) and the other is
the virtual gateway address, used by hosts to route packets to other subnets.
VRRP Groups
An IP router interconnects several subnets (LANs). A failure on one subnet must be
reported to the other subnets as well, so that remote hosts on all attached subnets
stop using the router. To achieve this, the VRRP service manages groups of
interdependent subnets. When one subnet fails in the group, it acts as if all subnets
had failed and stops advertising on all grouped subnets.
In order to ease configuration, some instances properties are defined at the
group level.
• Name a gateway identification string, can differ from the same
group name used in the backup (but using different
names is discouraged since it leads to human errors).
• Initial state The state of all instances at service start, this speeds up
the initial state stabilization. Normally the master is
initially master and the backup is initially backup, but
this is not mandatory.
• Advertisement period This VRRP parameter is given to the VRRP instances in
the group
• VRRP instances list The instances which are part of the group.
• Connection tracking If the router is NAT/PAT, VRRP should synchronize
connections when the backup becomes active. The
connection tracking service should be enabled and
configured separately.
The group properties must be identical in the master and in the backup, except maybe
for the initial state.
RFC changes
Three enhancements are added to RFC3768:
• Timers are in centiseconds instead of seconds; this feature is taken from VRRP
V3 (RFC5798).
• A new “fault” state allows tracking of partial hardware failures. The genuine
VRRP protocol only handles complete router shutdowns.
• The master and backup routers have different MAC addresses, i.e. virtual MAC
addresses are not supported. Hence, devices using the virtual router must
handle the ARP protocol, which is the vast majority, if not all, of IP network
devices.
b. Throughput
In load sharing, you must consider the possibility of a failure, where, after takeover,
all the data will be routed by one router only. In such a configuration it is therefore
advisable to restrain the throughput to half the acceptable throughput.
Note that reducing the timeouts make the system faster to react, but reduces the
useful throughput, because of the additional load placed upon the CPU and the
network.
g. Packets are not routed from wireless to wired interfaces! What is wrong?
The advanced settings/bridging mode setting was left to ARPNAT mode. As explained
in section V.2.6.2a, only a non-bridged wireless interface can route incoming data.
The “network” holding the wireless interface must be set to non-bridging, or the
client bridging mode must be 4-addresses.
h. SNMP
SNMP OIDs are not yet defined for VRRP configuration. Therefore, it is not possible to
configure VRRP using SNMP.
However, SNMP traps are defined and can be configured and sent.
V.6.1.2 SNMP V3
The SNMP v3 protocol provides more sophisticated security mechanisms than SNMP v1
and SNMP v2c. SNMP v3 implements a user-based security model (USM) that
authenticates and encrypts the requests sent between agents and their managers, and
provides user-based access control.
SNMP V3 splits the security into 2 pieces, the authentication / encryption and the
authorization.
• configIpRoutesTable: list of static routes. The static routes indicate over which
interface and gateway certain host or network can be reached.
• configIpZoneForwardTable: list of inter-zone forwarding rules. It allows to set the
forwarding policies between one zone and other zones. This table is used only for the
zone which disables IP Masquerading.
• configIpDscpTaggingTable: list of DSCP tagging rules applied on each incoming frame.
The incoming frames matching all the rules in this table will be tagged on DSCP tag.
Only routed frames forwarded from one IP network to another can be tagged.
Acksys MIB provides also management of DOS protection: enabled par default
• synfloodprotection: enable/disable SYN-flood protection
• dropinvalidpacket: drop/accept invalid frames or frames without active connection
The following OIDs cover configurations exclusive to roaming mode, they can help you
configure the roaming client further. Ignore them if the client doesn’t enable roaming.
configIfStaRoamingEnableDBM If the RSSI of the current AP falls below this value (in dBm), the client
will try leaving the current AP and roaming to another AP.
configIfStaRoamingRequiredBoost Roaming occurs only if the potential AP signal is above the current
AP’s plus this value (in dBm).
configIfStaRoamingScanPeriod Delay between two successive scan cycle (in millisecond)
configIfStaRoamingRssiSmoothingFactor The RSSI of the current AP is computed over the last few beacons
received. Select the importance of the last beacon relative to older
ones: the RSSI smoothing factor is a value between 1 and 16 that
indicates the step of 1/16 (e.g. 3/16, 5/16, 16/16)
In WEB interface it is in percentage format: 6%(1), 13%(2), 19%(3), 25%(4),
31%(5), 38%(6), 44%(7), 50%(8), 56%(9), 63%(10), 69%(11), 75%(12), 81%(13),
88%(14), 94%(15), 100%(16) Default:19%(3)
configIfStaRoamingMinimumStaLevel The AP’s signal is below this level (in dBm), it will not be roaming
candidate, but it will still be used if there is no current AP nor better
AP. ‘0’ to disable this configuration
configIfStaRoamingAboveLevelThreshold When the perceived signal level of the current AP passes above this
limit (in dBm), the client will try to roam to another AP. ‘0’ to disable
this configuration
configIfStaRoamingMaxSignalLevel APs which are above this level (in dBm) have less priority when
choosing the next AP to roam to.
configIfStaRoamingMinRoamDelay Roaming won't occur before this delay (in ms) has elapsed since the
last association.
configIfStaRoamingNoReturnDelay Roaming won't occur to an AP that was left recently. (in ms, max
180000 ms)
configIfStaRoamingThresholdHysteresis This value (in dBm) will be added and subtracted to each threshold to
set the corresponding threshold hysteresis interval.
configIfStaRoamingOffChanMaxDelay Maximum delay offchannel during which data must be buffered by
the associated AP (in ms)
configIfStaRoamingOffChanProbeDelay Delay (in ms) for collision avoidance after a channel switch, before
sending the probe request
configIfStaRoamingPerChanProbeDelay Time (in ms) to wait for an answer from the AP.
• configIfAPTable: List of configurable access points. You can find all configurations
about general AP settings, securities, MAC filter and frames filter in the table.
As in the configIfStaTable, each security has specified configurations. Focus on the
configuration of the security you selected and ignore the other security configurations.
SECURITY SPECIFIED CONFIGURATION DESCRIPTION
WEP configIfAPWepKey1 - 4 WEP KEY #1- #4 defined in HEX (characters 0-9, A-F) or
ASCII format string.
configIfAPWepAuthentication WEP type: open, share
configIfAPWepKey currently used WEP key, a value between 1 and 4 that
indicates select one of four WEP keys
WPA(2)-PSK configIfAPKey Pre-Shared Key with a length from 8 to 63 characters. If
its length is 64 characters it will be used directly as
hexadecimal format
configIfAPPreAuthentication 802.11w security feature activation
configIfAPWpaGroupRekey Time interval for rekeying the GTK (broadcast/multicast
encryption keys) in seconds.
configIfAPWpaPairRekey Time interval for rekeying the PTK (unicast encryption
keys) in seconds.
configIfAPWpaMasterRekey Time interval for rekeying the GMK (master key used
internally to generate the GTK) in seconds.
WPA(2)-EAP configIfAPKey Shared Secret with a length from 8 to 63 characters.
configIfAPPreAuthentication 802.11w security feature activation
configIfAPWpaGroupRekey Time interval for rekeying the GTK (broadcast/multicast
encryption keys) in seconds.
configIfAPWpaPairRekey Time interval for rekeying the PTK (unicast encryption
keys) in seconds.
configIfAPWpaMasterRekey Time interval for rekeying the GMK (master key used
internally to generate the GTK) in seconds.
configIfAPRadiusIndex Selected index of configRadiusTable entry
• configRadiusTable: sub-table of Radius server prepared for AP security configuration. It
can cover several Radius servers. You can select one Radius server for your AP.
The selection of the Radius server for an AP is different between the web interface and
the SNMP agent. If you change the Radius server in both services, the web interface
will prevail. To recover the Radius configuration set by SNMP, first use the web
interface to change the AP to a non-Radius mode.
• configDetailsNasId: NAS common identifier for radius servers. It is used for AP in WPA-
EAP mode.
Variables may be bound in the notification to provide detailed information about the event.
Available variables are listed in the MIB for each affected event. You can find these variables
under OID .1.3.6.1.4.1.28097.11.255 (notificationBindings).
V.6.10 Examples
These example scripts use SNMP-SET (provided in the Linux net-snmp package). They are
meant to run under Linux. Use them as a guideline for other cases.
This script changes the product IP address, and applies the changes:
# define a shell macro for snmpset
alias CFGSET="snmpset -m ACKSYS-WLG-MIB -c public -v2c"
# configure it with a new address and netmask
CFGSET 192.168.1.253 configIpSubnetIPv4Addr.\"lan\" a 10.0.1.2
CFGSET 192.168.1.253 configIpSubnetIPv4Mask.\"lan\" a 255.0.0.0
# save and apply without rebooting
CFGSET 192.168.1.253 adminSave.0 i 1
CFGSET 192.168.1.253 adminApply.0 i 2
The following script replaces the factory-defined AP interface on radio A, by a Wi-Fi client
bridged to the internal bridge, and sets a WPA-PSK key:
# define a shell macro for snmpset
alias CFGSET="snmpset -m ACKSYS-WLG-MIB -c public -v2c"
# delete existing AP interface
CFGSET 192.168.1.253 configIfAPRowStatus.\"radio0w0\" i 6
# add a client interface
CFGSET 192.168.1.253 configIfStaRowStatus.\"radio0w0\" i 4
# configure it with WPA/WPA2-PSK
CFGSET 192.168.1.253 configIfStaSsid.\"radio0w0\" s myNewSsid
CFGSET 192.168.1.253 configIfStaSecurityMode.\"radio0w0\" i 3
CFGSET 192.168.1.253 configIfStaWpaVersion.\"radio0w0\" i 1
CFGSET 192.168.1.253 configIfStaWpaCipher.\"radio0w0\" i aestkip
CFGSET 192.168.1.253 configIfStaKey.\"radio0w0\" s "shared psk key"
# set bridge type to L25NAT (therefore, not WDS)
CFGSET 192.168.1.253 configIfStaWds.\"radio0w0\" i disable
# save and apply without rebooting
CFGSET 192.168.1.253 adminSave.0 i 1
CFGSET 192.168.1.253 adminApply.0 i enable
The following creates the equivalent of a repeater, starting with the already factory-
defined AP:
# define a shell macro for snmpset
alias CFGSET="snmpset -m ACKSYS-WLG-MIB -c public -v2c"
# configure the existing AP interface
CFGSET 192.168.1.253 configIfStaWds.\"radio0w0\" i enable
# add a client interface
CFGSET 192.168.1.253 configIfStaRowStatus.\"radio0w1\" i 4
# configure it
CFGSET 192.168.1.253 configIfStaSsid.\"radio0w1\" s "acksys"
CFGSET 192.168.1.253 configIfStaSecurityMode.\"radio0w1\" i none
CFGSET 192.168.1.253 configIfStaWds.\"radio0w1\" i enable
# set MAC address of next AP
CFGSET 192.168.1.253 configIfStaBssid.\"radio0w1\" x 90a4de214f85
# save and apply without rebooting
CFGSET 192.168.1.253 adminSave.0 i 1
CFGSET 192.168.1.253 adminApply.0 i enable
Warning: Unlike the “WLg” products series, the C-KEY is never saved or updated
automatically in these products.
Depends on Diffserv
0 Best Effort
(see below)
1 Background 1
2 Spare 2
3 Excellent Effort 3
4 Controlled Load 4
5 Video 5
6 Voice 6
7 Network Control 7
The product will map the IEEE 802.1p priorities 1 → 7 to the internal traffic classes 1 → 7.
The IEEE 802.1p priority 0 will be considered as no priority set, and then the Diffserv
priority will be used instead.
The product adds the following mapping between the LAN’s Layer 3 Diffserv field and the
WLAN's WMM access categories, that will be used when 802.1p priority = 0, and when there
is no VLAN but there is Diffserv field.
Since network wiring between carriages may be difficult or often impossible, particularly in
case of refurbishment operations because of aging or poor-quality connectors, WiFi has
naturally established itself as the most efficient solution by allowing redundancy, reliability
and high-speed networking.
In order to avoid bad coupling, we have to make sure that each switch node only receives
signal from the closest valid switch node.
The following methods are available to make sure to comply with the above rule:
- Use a directional antenna in order to focus radiations on the desired coach
- Use as possible low gain antenna and/or RF attenuators
- Increase space between two trains
- Use the Link establishment threshold to exclude undesired switch nodes (see SRCC
parameters).
All these methods allow to get rid of bad coupling problems. Nevertheless, since there are
many different coach types, it is mandatory to perform a system calibration, to find out the
combination of methods and the optimal parameter values, in order to get the best results.
In order to avoid bad couplings from the same coach, every switch node must be aware of
its own internal topology to avoid association with the internal nodes of the carriage.
The redundancy is not as full as in the ring topology but it allows an inter-carriage link
failure or a wireless failure.
Moreover, this architecture is especially relevant when switch nodes embed the Ethernet
bypass feature. This allows not breaking the architecture when a switch node fails.
The weakness is the internal Ethernet link. This link requires a very low failure rate in order
for the system to be resilient to failure.
V.9.10.1 Prerequisites
SRCC requires some pre-configuration in order to work correctly. Basically, the user must
create a bridge and add Ethernet interfaces to it. In a redundant or ring topology, it is
mandatory to activate RSTP for this bridge.
If the product is equipped with two radio cards, the second one can implement some
roles (APs or client) and then add them to the bridge in order to connect them to the
backbone.
This allows, for example, on-board service access points (with or without VLAN) on the
second radio while the first one is dedicated to the backbone (thanks to SRCC). The
diagram below shows this possibility.
In case of Redundant Mixed Mode, the Product Type becomes irrelevant. In this mode,
the inter-carriage Ethernet link provides a way to discover all the devices of the train in
one time. At the end of the topology discovery each product will have a list of all devices
of the train. Knowing products of his own train allows SRCC to exclude products not listed
(i.e.: products from another train) when setting up the wireless link.
It’s important to notice that all the products of the coach must be powered up on at the
same time. If not, some lately powered up products might be considered non-existent by
theirs partners. The topology discovery phase duration can be reduced or extended in
order to accommodate with specific power up sequences.
During this step, no wireless interface is created nor allowed on the SRCC associated
radio card.
Terminal product
The Ethernet topology discovery process expects to find at least one product at the
other end of the coach. Else it will automatically believe to be installed in the last
carriage of the train. This may provide an additional level of redundancy if customer
routing/control devices are redundantly installed at each end of the train and two
SRCC products fail at the same end of a coach.
The choice between all available partners is based to a large extent on signal level
between all stations and devices information (i.e.: not only based on direct signal level).
In case of Redundant Mixed Mode, if the product is in the list established by the topology
discovery, a "boost" coefficient is applied. This way, products in the list are boosted and
are more likely to be chosen1 (excluding devices from trains on other railtracks).
If the inter carriage link is faulty during the topology discovery, devices not discovered
will only not take advantage of the boost.
1But this is not systematic. So, if the product in the other carriage was missed during the topology discovery, it
still has an opportunity to be the chosen wireless partner, due to a good RF signal level, in preference to another
detected product farther in the train.
Inside the device, the wireless link is then bridged with the Ethernet network and allows
data to transit from one coach to another.
The devices remain in this state as long as the link is not lost (see below). As long as the
devices stay in this mode, the link is established and data can flow across the coaches.
Wired discovery
A – 120s – Ethernet discover scan duration
Wireless discovery
S0 – 60s – link establishment duration
Master Slave
As soon as the link is marked broken, the device restarts the neighbor discovery phase
and tries to find a potential new partner again.
Routing / Firewall
for product configuration.
After changing parameters, press Save to record in permanent memory the parameters
changed in this page. In this case the changes will not be applied immediately, but only after
a restart, or after a subsequent Save & Apply.
Press Save & Apply to record the parameters, and then apply all configuration changes
made in any page up to now.
Press Reset (if available) to revert the data in the form to previous values (the values
displayed after the last save)
The WIFI INTERFACE frame summarizes the main settings of each WiFi interface
Enabling or disabling a radio card will only be applied after a Save & apply
Click the Remove button to delete this SSID. Click the Edit button to open the radio
window and edit this SSID properties.
Country:
The regulation rules of the selected country will determine the channels and
transmission powers you can use. Additionally, in client role the product will use the
country provided by the AP in its beacons.
Cluster mode:
You can cluster the radio cards so that one radio is used to scan multiple channels while
the other connects to AP’s and transfers data. In this mode, the scanning process does
not disturb data transfers, but the scanner radio is reserved for this use.
When Group for scanning is selected, the scan for APs occurs on one radio card. The
results are given to the other radio card so that it can select the best AP for roaming
purposes. This implies that the AP signal levels must be the same for both cards; hence
their antennas positions, polarities and cabling must be very close to each other. The
roaming trigger level boost should not be set too small, to account for residual
differences.
In this mode, the roaming parameters are taken from the configuration of the radio card
used for data transfers.
When Group for scanning is selected, you can choose the card that will be used for
scanning with the Scanner card radio buttons.
When Group for connect before break is selected, the behavior of the two radio cards is
quite similar to that of Group for scanning mode, but the functions of the two cards will
be swapped, completely transparently, each time a roaming occurs. This operating
mode is detailed in section Connect before break.
The WiFi 1 interface is selected by default as the primary card, but since it’s a temporary
state, this has, in most cases, no incidence on the operation.
In this mode, it is possible to ask the same radio card to perform both functions, but
note that in this case, you can only roam on a single radio channel.
For dual radio products, simply select the
same radio card for both functions:
For products such as the Railbox/6xA0, equipped with 802.11ac Wave 2 radio, you must
select the frequency band (5GHz or 2.4GHz) before proceeding with the Wireless
configuration.
VI.1.2 Wireless/Radio
VI.1.2.1 SETUP/PHYSICAL INTERFACES/WIRELESS SETTINGS/DEVICE CONFIGURATION
General Setup tab:
This section gathers all the settings common to each SSID you may create on a radio card.
Enable device:
If this checkbox is checked, the radio card is enabled and is able to communicate.
Uncheck it to disable the radio card.
802.11 mode:
▪ The 802.11g+n mode operates in the 2.4GHz band (802.11g) and is compatible with
802.11g and 802.11n devices.
▪ The 802.11a+n mode operates in the 5GHz band (802.11a/h) and is compatible with
802.11a/h and 802.11n devices.
▪ The 802.11ac+n mode operates in the 5GHz band and is compatible with 802.11ac,
802.11a/h and 802.11n devices.
Note: a product configured in 802.11a+n/ac+n cannot communicate with another one
configured in 802.11g+n because they are using different frequency ranges.
one immediately above the primary channel, or as the one immediately below the
primary channel. You can also set 40MHz automatic, and let the unit make the choice.
40MHz automatic is not compatible with AP, Ad-hoc, Mesh and multi interfaces.
When HT40 mode is selected, two additional options appear:
Disable HT scan:
When this option is activated, the system will not check for the presence of other APs
on the 40MHz width of the operating channel, which can favor the appearance of
interference and degrade the quality of the communication.
HT coexistence:
With this option, the system will abandon the aggregation to free the secondary channel
if it is used by other APs
Channel:
According to the selected 802.11 mode and the regulation rules of the selected country,
a list of channels is available for selection. This is not used for infrastructure client
modes, as they use all the allowed channels for scanning (possibly limited by roaming
parameters).
In some cases, a single radio card can handle multiple Wi-Fi roles simultaneously. In this
case any “client” function must be set to only scan the common channel. See also
section V.2.1.5 Virtual AP (multi-SSID) and multifunction cards
See chapter Appendix – 802.11 Radio channels for more details on the available
channels.
You can select several channels so that the AP will select the cleanest one, and will be
able to switch to another if a radar is detected on the current one. To select multiple
channels on classic browsers, use the Ctrl+click shortcut.
Note: remember that channels subject to DFS incur a checking delay (CAC time) before
use. See section V.2.4 Radio channels and national regulation rules for more
information.
This option allows you to restrict the MCSs that your Access Point advertises as
supported to the clients.
In the same manner as a/b/g rates, only selecting highest MCSs in a stream allows to
increase performances for broadcast and multicast frame. The drawbacks are also the
same as the a/b/g case.
This option is not available with 802.11ac radio cards.
Beacons are used by APs, mesh nodes and ad-hoc stations to advertise their capabilities
and settings (HT mode, SSID…) to other devices.
The default settings depend on the 802.11 mode.
If you decrease the Beacon interval you consume more bandwidth on the channel, and
you can decrease the global Wi-Fi performance; but you will detect connection losses
faster.
Fragmentation Threshold:
This option configures the maximum 802.11 frame size in 802.11a/b/g mode in bytes.
Frames that exceed this threshold are fragmented.
RTS/CTS Threshold:
The Wi-Fi standard uses the RTS/CTS protocol to avoid collisions in the air.
This option defines the size of the 802.11 a/b/g frames subject to this protection. Frame
exceeding this size are sent under CTS/RTS protocol.
Use CTS/RTS when you have much interference on your channel and a poor
performance on the Wi-Fi; or when you have hidden stations (e.g. in an exchange
between stations A and B, a third station which is visible by A but not by B, hence
interfering with B when it sends to A). On other case this protection decreases the
global Wi-Fi performance.
Retry settings:
Unicast data frames are normally acknowledged. If the transmitter does not receive the
acknowledgment, it must resend the frame.
In 802.11n, several frames can be aggregated into one big frame called an A-MPDU.
Independent frames are acknowledged by an individual ACK frame, while A-MPDU
frames are acknowledged by a single “block acknowledge” frame containing one
acknowledgment for each subframe in the A-MPDU. Unacknowledged frames are resent
in a later A-MPDU.
When you check this option, you can control the number of retries.
Short retry:
This is the number of retries for a physical data frame (single or A-MPDU).
Long retry:
This is the number of retries for a physical data frame (single or A-MPDU) sent with the
RTS/CTS protocol.
Aggregate retry:
This option configures the number of retries for a frame aggregated into an A-MPDU
(each 802.11 frame sent in A-MPDU frame).
Maximum association:
Specifies the maximum number of clients allowed to connect on the Access Point.
Hide ESSID:
This option allows you to not broadcast the SSID on the network. This means that your
clients need to know the SSID beforehand, since scanning will not reveal the SSID of the
AP. Please check section Radars detection overview (DFS) for more details about hidden
SSID and DFS considerations.
Network:
This option allows selecting the network where the interface is added. In the default
factory settings, all the physical interfaces (Ethernet and radio ports) are bridged in the
lan network
If you fill in the field to the right of and validate,
this will create a new network. In this case, your radio interface will be automatically
added to this new network and removed from the current one, so please be careful and
only use this feature if you have a very clear idea of what you want to do.
Please see section Network for more details on network management.
Mesh ID (only in Mesh mode):
This option replaces the ESSID when the Mesh mode is selected. It has the same
purpose.
Multiple ESSIDs:
When this is checked, a multi-selection field, Wireless network nicknames, replaces the
single ESSID field. You can select several SSIDs with their security parameters, and the
client will associate to any AP advertising one of these combinations. In case several
matching APs are in range, you can prioritize the SSIDs.
When using multiple ESSIDs, the roaming features are not available, and the security is
defined together with the corresponding ESSID in a separate menu.
See section 0 –
Wireless SSID.
When Connect before Break is selected in the Cluster mode from the Global
Parameters, the Network field is replaced by bond interface. You must give a name to
this interface.
According to the choice you've made, some properties will appear or disappear.
Fast Transition Support (802.11r):
This box appears only for clients in any of the WPA/WPA2 modes. Check this box to
allow use of the 802.11r protocol against APs that support it, resulting in a reduction of
the time necessary to authenticate when roaming.
You need to properly configure the APs, their mobility domain and NAS ids to take
advantage of this feature.
Wireless Security tab, WPA-PSK, WPA2-PSK, WPA3-PSK & PSK Mixed Modes:
Wireless Security tab, WPA-EAP, WPA2-EAP, WPA3-EAP & EAP Mixed in Client Mode:
EAP-Method TLS:
User certificate:
Selects the location of the user certificate file to be uploaded. Must be provided in
PEM format.
User Private Key:
Selects the location of the Private Key file to be uploaded. Only PEM private keys are
allowed.
Password of User Private Key:
Password associated to the chosen Private Key.
User identity:
This field gives the login to use during EAP-TLS authentication. In this authentication
method, this field is rarely used by the RADIUS server. The default value is acksys
EAP-Method PEAP:
Anonymous identity:
This value allows to configure the identity that will be sent in phase 1 of the protocol.
It’s not used by the RADIUS server, but it’s a necessary element for the establishment
of the TLS tunnel. As this field is clear on the network, we recommended, for security
reasons, to set a value different from the login used for authentication.
If this field is left empty, the identity used by the authentication method (User identity)
will be used.
Authentication (phase 2):
This field contains the Authentication method. To date, only MSCHAPV2 is available
User identity:
Identity used for the authentication.
Password:
Password associated to the User identity
Wireless Security tab, WPA-EAP, WPA2-EAP, WPA3-EAP & EAP Mixed in AP Mode:
Wireless Security tab, WEP Open System & WEP Shared Key:
Security:
Choose between no encryption and WPA3-PSK.
Pre-Shared key:
Enter here the MESH network shared key.
Separate Clients:
This option is only available when the Isolating Access Point role is selected. When
Separate Clients is checked, wireless clients won’t be able to communicate between
them (this is not possible in Access point mode). See section Infrastructure Mode for
more details.
Power Save buffer per client:
Define the maximum number of frames that can be queued for each client
Maximum total size of all power save buffers:
Maximum number of frames that can be buffered for all the stations
Disassoc low ack:
With this option set, when more than 50 packets sent by the AP are not acknowledged
by the client, the client is disconnected.
Maximum station inactivity:
Idle time in seconds after which the client will be disconnected.
Bridging mode:
This option allows selecting the bridging method (Please see section Wired to wireless
bridging in infrastructure mode for more details) that will be used if this interface is
added to a bridge (please see section Network for more details).
The available methods are:
• ARPNAT (default value)
• 4 addresses format (WDS)
• Wired device cloning
• PROFINET device cloning.
When Connect before Break is selected in the Cluster mode from the Global
Parameters, you must select 4 addresses format (WDS).
Please read the section Cloning for more details on cloning mode.
Pre-connect with local MAC address:
This option exists only with Wired device cloning or Profinet device cloning. If checked,
this allows the product association to an Access Point with the local Wireless adapter
MAC address when no Ethernet or Profinet equipment is detected. In this case, if
cloning to the Ethernet or Profinet equipment occurs some time later, the ARP table of
the remote devices will no longer be valid. So, these remote devices won’t be able to
access to the product until the ARP table is refreshed.
Cloned MAC addr:
This field exists only with Wired device cloning or Profinet device cloning. Fill this field, if
you want to force the MAC address used for the cloning. Leave blank to clone the first
device found.
Key cache life time:
This field exists only with WPA/WPA2 EAP. If your AP supports the Opportunistic key
caching (OKC) or the pre-authentication, this option allows configuring the life time for
each PMK. The default value is 43200 seconds (12 hours).
BSSID:
This option allows setting the BSSID for this interface, in MAC address format, as six pair
of column separated hex digit (ex: 12:34:56:78:9A:BC).
If the bridging mode is set to 4 addresses format (WDS), Proactive Roaming must be
enabled ONLY when the Connect before Break mode is selected.
on other channels, so it returns to the AP channel before the AP buffers are exhausted.
This duration must be set greater than the sum of the two next parameters. It will be
further reduced automatically to the duration of the AP beacon interval. Its precision is
about 10 ms.
If this parameter is large enough, the scanner can switch channels and send probes
several times before returning to the current AP channel.
Off-channel adaptation delay:
Adaptation delay, in ms, after a channel switch, before sending the probe request or
accepting beacons. Reducing below 30 ms speeds up scanning but decreases AP
detection likelihood.
Per channel probe response delay:
The time the scanner will stay on the scanned channel after sending a probe request,
waiting for probe responses or beacons. To tune this parameter, you must account for
the traffic on the channel and the swiftness of the AP (or its controller) at answering
probe requests.
For DFS channel, where probes are forbidden, a floor value of 108ms is enforced to
ensure beacon detection.
Roaming log info:
Select the roaming information that must be displayed. Please note that the Wireless
log level must be set to Roaming or higher (see section 0 Log settings)
Access point selection algorithm selection box appears only when Connect Before Break
is selected. When selected, a new tab is visible : Linear Roaming
MAC-Address filter:
You can specify a list of client MAC addresses that will be either allowed or denied. Let
the filter disabled if you do not require it. WARNING: this must not be used alone as an
effective security feature, since MAC addresses are is easy to masquerade.
MAC-List:
Enter the client MAC address to deny or allow. Enter MAC addresses as hexadecimal
strings, with a separating column every two digits.
Click the add icon on the right of the last field to add a new address. Click
the remove icon on the right of any field to remove it from the list.
SRCC configuration
In order for SRCC to work correctly, all the parameters (except the product type) in the
two following sections must be identical on every product of a train.
General Setup:
Network: The network to which SRCC will add its wireless interface.
Product type: All products on the same coach edge must have the same product type
(whatever it is).
Link establishment threshold & Link establishment duration:
A potential partner is considered valid if its signal level stays over Link establishment
threshold during more than the Link establishment duration.
Broken link threshold and Broken link duration:
If an established link’s signal drops below Broken link threshold during more than
Broken link duration, the link is considered broken, and SRCC start its wireless detection
process again.
The broken link duration includes the DFS CAC time. This explains the 660s default value
which is 600s (European CAC time for weather channels) and 60s (for the broken link
duration itself). You can reduce this value according to your current DFS CAC time, see
III.5.6 Radars detection overview (DFS) for usual values.
See V.9.8 ACKSYS’s Smart Redundant Carriage Coupling (SRCC) for more information
about the above last four parameters.
The parameters below allow the user to configure the final wireless link:
Wi-fi band:
The Wi-Fi frequency range for the final links. Choose 802.11a for the 5GHz band and
802.11g for the 2.4GHz band.
Use VHT80 ieee802.11ac:
If you choose the 802.11a band, click this checkbox to use the 802.11ac VHT80 channel
feature. This will dramatically increase the link bandwidth. If unchecked, ieee802.11ac
VHT40 is selected.
First link channel:
This is the wireless channel associated with the first SRCC final link. DFS channels have
been removed from the list since SRCC uses it for its wireless discovery. This way, the
discover process will not be stopped by a DFS event.
Second link channel:
This is the wireless channel associated with the second SRCC final link. Even if the
products are configured in non-redundant topology, both channels are required.
This is the gain in per cent added to the target metric. min=1; maximum=65535
Wi-Fi discover ap ssid:
This is the SSID used by the wireless scan process to discover other potential partners.
Wi-Fi pre-shared key magic:
This key allows the user to define his own key, so that it can be different for each user.
Peer table timeout:
During the wireless discover process, if a potential partner’s signal level is correct (over
the Link establishment threshold) and suddenly disappears, this partner will be erased
from the partner (peer) list after a Peer table timeout duration.
Target table timeout:
This is the same as peer table timeout, but expressed for the whole cell – the group of
wireless peers on the other carriage. See SRCC technical reference for more details. If
the cell is not valid for more than Target table timeout, it will be removed from the list.
Peer acknowledge timeout:
This is the duration the Master waits for the answer from all partners after sending its
proposed cell architecture.
Peer reconfiguration timeout:
This is the duration the Master waits for all the partners to switch to their final roles.
Internal L2 GRE interface IP prefix:
SRCC’s internal uses a GRE L2 tunnel. This GRE interface is configured with a C class IPV4
address. This parameter offers the user a way to customize the IP in case of conflict
between the default IP address and its network.
This parameter represents the GRE interface IP prefix. Only the first three bytes are
significant (the last one is ignored). If the final role is AP, the last digit will replace with 1
and with 2 in case of client final role.
For example:
User prefix: A.B.C.D
Final IP
role
AP A.B.C.1
Client A.B.C.2
Enable interface:
The cellular interface is disabled by factory settings. Check this box to use the interface.
Network description:
Friendly name for your network.
Default SIM card:
The SIM slot which is first selected at startup.
Protocol:
Only DHCP for IPv4 is supported. The operator must provide an IP address through a
DHCP server.
Replace default route:
If checked, the default gateway pulled from the DHCP server will override the current
one upon connection.
Default gateway metric:
The priority of the DHCP provided default gateway.
If two default routes are possible, when using “replace default route” only the Cellular
route will survive; when using “default gateway metric” both routes will survive but only
the one with lowest metric will be used.
Use peer DNS:
Normally, the DNS addresses pulled from the DHCP server are added to preconfigured
DNS. Unchecking this will avoid using the operator provided DNS at the benefit of other
sources (like LAN servers).
SIM 1 / SIM 2:
Each of the two tabs configures a SIM slot. Both can be filled in, regardless of the presence
of the SIM in its slot.
State at startup:
When down is selected, the cellular will not try to connect to the operator after boot,
and will need a specific action from the Events/Alarms service to start.
Log AT transactions at “debug” level:
Log detailed configuration and status transactions between WaveOS and the cellular
card. Use only at Support Service request.
This page allows to apply input or output filters on the Ethernet interfaces of the product.
Input/Output filters group:
Choose one of the filters prepared in routing/firewall/bridge filter section. For more
information about filters group, please see Bridge filter
802.1x Supplicant
In this tab you can activate 801.1x authentication on the Ethernet ports. To date, only the
supplicant mode is supported.
EAP-Method:
Select the EAP-Method to be used, PEAP or TLS
Phase 2:
This field contains the Authentication method. Only MSCHAPV2 is available.
Identity:
Identity used for the authentication.
Password:
Password associated to the User identity
EAP-Method TLS:
Identity:
This field gives the login to use during EAP-TLS authentication.
CA-Certificate:
Selects the location of the CA-Certificate file to be uploaded. Certificates and keys
must be provided in PEM format (see note below).
Client certificate:
Selects the location of the Client certificate file to be uploaded. Must be provided in
PEM format.
Client Key:
Selects the location of the Key file to be uploaded. Only PEM private keys are allowed.
Client Key password:
Password associated to the Client Key.
NOTE: The PEM format is defined by the OpenSSL project. It’s a text file identifiable by its
first line beginning with “-----BEGIN” and the binary data encoded using the base64
method.
VLAN configuration:
VLAN description
Enter a friendly name for this interface (optional).
VLAN ID
Enter the id for virtual interface. If you need to create several VLAN IDs on top of the
same physical interface, you can use the space character to separate the IDs. Example:
5 10 120
VLAN priority
Select the priority that will be assigned to tagged egress traffic from this port.
Interface
Select the physical interface on which you create the virtual interface.
For Wi-Fi interface, you can create a VLAN interface only for Mesh and Client Role. This
interface can then only be routed (it cannot be bridged with other interfaces).
Bond description:
Symbolic name of you bond interface.
Bond Mode:
Selection of the required bond mode: Round Robin, Broadcast, 803.3ad LACP, Connect
before break. These modes are described in the following pages.
Round-Robin Mode
Round-Robin mode is used for load balancing. The transmission of packets is done
sequentially on each of the cards active in the aggregate. This mode increases bandwidth
and manages fault tolerance.
Slaves:
The two Ethernet interfaces (LAN 1 and LAN 2) must be selected.
Packets per slave:
Specify the number of packets sent on a slave interface before moving to the next. The
value can vary from 1 to 65535. The default value is 1. If you enter 0, the value will be
chosen randomly.
Resend IGMP:
Specifies the number of IGMP membership reports to be issued after a failover event.
One membership report is issued immediately after the failover, subsequent packets are
sent in each 200ms interval. (0-255)
Broadcast Mode
This method is based on broadcast policy which consists in transmitting everything on all
slave interfaces. It provides fault tolerance. This can be used only for specific purposes.
Slaves:
The two Ethernet interfaces (LAN 1 and LAN 2) must be selected.
802.3ad LACP
This mode is known as Dynamic link aggregation mode which creates aggregation groups
having the same speed. It requires a switch that supports IEEE 802.3ad dynamic link. The
selection of slaves for outgoing traffic is based on a transmit hashing method.
Minimum links:
Specifies the minimum number of physical links that must be active for the bonding
interface carrier to be mounted. The default value is 1 and must remain at 1.
802.3ad system priority:
Allows to define the priority of the link, which will be managed by the 802.3ad switch.
The highest priority is 1, and the lowest 65535. The default is 65535.
802.3ad system MAC address:
By default, the virtual MAC address of the bonding interface is used. This field allows to
define another value.
802.3ad aggregation select logic:
Specifies the 802.3ad aggregation selection logic to use. The possible values and their
effects are:
Stable The active aggregator is chosen by largest aggregate bandwidth.
Reselection of the active aggregator occurs only when all slaves of the
active aggregator are down or the active aggregator has no slaves.
Bandwidth The active aggregator is chosen by largest aggregate bandwidth.
Reselection occurs if:
- A slave is added to or removed from the bond
- Any slave's link state changes
- Any slave's 802.3ad association state changes
- The bond's administrative state changes to up
Count The active aggregator is chosen by the largest number of ports (slaves).
Reselection occurs as described under the "bandwidth" setting, above.
The bandwidth and count selection policies permit failover of 802.3ad aggregations
when partial failure of the active aggregator occurs. This keeps the aggregator with the
highest availability (either in bandwidth or in number of ports) active at all times.
Here we define the criteria that will allow to decide if an interface is usable. The slave
interface which gave its MAC address to the bonding interface is called the active
interface. The other slaves are called backup interfaces. The different options are:
None: (default): We check if there has been incoming and outgoing ARP traffic recently
on the interface to determine if it is usable
Active: We look if there has been incoming and outgoing ARP traffic recently on the
interface, and for the active interface, we examine the content of incoming and
outgoing ARP
Backup: We check if there has been incoming and outgoing ARP traffic recently on the
interface, and for the backup interface, we examine the content of incoming and
outgoing ARP
All: We examine all ARPs on all bonding interfaces to determine if they are usable.
Filter: We check if there has been recent ARP traffic entering the interface to determine
if it is usable
Filter active: We check if there has been recent incoming ARP traffic on the interface,
and for the active interface, we examine the content of incoming and outgoing ARPs.
Filter backup: We check if there has been incoming ARP traffic recently on the interface,
and for the backup interface, we examine the content of incoming and outgoing ARPs.
Filtering tab
VI.1.4.4 L2 Tunnels
In this section, you can configure Layer 2 tunneling with GRE.
The GRE encapsulation adds L2, L3 and GRE headers to the original L2 frame. This overhead
will reduce the network MTU (Because the L2 frame is limited to 1524 octets on 802.3
networks).
NOTE: The 802.11 networks support a larger frame than 802.3 networks. If your GRE tunnel
traverses 802.11 networks only, it is recommended to increase the MTU on the GRE
interface and the network bearing the 802.11 physical interface, to allow using the
maximum 802.3 MTU for the original L2 frame.
For example, setting the GRE and WiFi interfaces MTU to 2000 is sufficient to encapsulate
frame sizes up to the 802.3 MTU.
L2 TUNNELS Overview
In this page, you can create a GRE tunnel:
Filtering tab
VI.1.5 Network
This page displays the current network configuration.
Enable interface
This checkbox allows you to temporarily disable the LAN interface without losing your
configuration.
Network description
Friendly name for your network.
Protocol
Choose DHCP if you have a DHCP server in the network and you want to assign an IP
address to the device. In this case, you do not need to fill in the fields shown above
except possibly DNS-Server
Choose static if you do not have a DHCP server in the network or if, for any other
reason, you need to assign a fixed address to the interface. In this case, you must also
configure the fields shown below.
Note that you cannot choose DHCP if you have enabled the DHCP Server option on the
DHCP page; the AP cannot be both a DHCP client and a DHCP server.
IPv4-Address (only in static mode)
The IP address of the AP on the local area network. Assign any unused IP address in the
range of IP addresses available for the LAN. For example, 192.168.0.1.
IPv4-Network (only in static mode)
The subnet mask of the local area network.
Default IPv4-Gateway (only in static mode)
The IP address of the router on the local area network. Use 0.0.0.0 if no gateway is
defined.
Default Gateway Metric
When several Networks are configured, with their own gateway, the Default Gateway
Metric allows to introduce a priority between these gateways. The gateway with the
lowest Metric will be chosen.
DNS-Server:
The IP addresses of the DNS server(s) you want to use. If you selected the DHCP
protocol, you can choose to use the value defined in the menu TOOLS/System, or you
can define a new Hostname, specific to this network.
IP Alias:
IP aliases can be useful if you need an access to your device from different networks, for
example when your product is configured in router mode, and acts as a gateway for
different subnets
To add an IP alias, enter a mnemonic and click Add, then enter the desired IP address, and
the associated subnet mask.
Interfaces Settings:
Bridge interfaces:
If checked, all interfaces in this network are linked with the software equivalent of an
Ethernet switch.
Enable STP/RSTP:
If checked, the STP/RSTP (Spanning Tree Protocol) will be activated on this bridge. If you
choose to not use STP/RSTP, you have to set up your devices to avoid network loops by
yourself.
Some cautions must be taken with wireless interfaces, please see Spanning Tree
Protocols (STP, RSTP).
Enable LLDP forwarding:
Check this box if the internal bridge must forward the LLDP Multicast frame.
Bridge VLAN:
Enable VLAN management in the bridge. Please see: Vlan Management
Interface:
This is the list of available network interfaces. Disabled (greyed) interfaces are already
used in another network. For bridge networks, select all the interfaces you want to
bridge together into the LAN being configured. For simple networks, select the one
interface to configure.
Advanced Settings:
Network Persistence:
When this option is enabled, the IP setting (routes, gateway, virtual interfaces, etc.)
remains persistent when the physical interface loses its connection. This makes it
possible, for example, to avoid systematic sending of DHCP requests when an interface
loses the link.
Default value is enabled for static protocol (fixed IP) and disabled for all the other
protocols (DHCP, VRRP).
Cellular (on some models)
When present, this is an alias entry pointing to the Cellular configuration in the “Physical
interfaces” submenu. See Cellular in that section.
State at startup
Gives the network status at startup. The default state is "Up", except for networks
whose protocol is "none". Use "Down" only if this network is to be activated by an event
VI.1.6 VPN
This page allows to create a VPN interface
To create a new VPN instance, click on Add instance, this will open the OpenVPN
configuration page.
OPENVPN Configuration
State at startup
Gives the VPN network status at startup. The default state is "Up", except for networks
whose protocol is "none". Use "Down" only if this network should be brought up only by
event rules.
OpenVPN instance description
This is the friendly name you give to this VPN instance.
Role
The role can be Server or Client. The server waits for clients to call in. The Client calls the
server to initiates the connection.
Protocol
Protocol can be UDP or TCP. Favor UDP, as TCP leads to potential conflicts in the TCP
over TCP redundancy mechanisms. You must ensure that the routers between the Client
and the Server open the ports necessary to authorize the packets of the selected
format.
Listener port
This is the UDP or TCP port listened by the Server, waiting for a Client to call. Default is
1194.
Data channel compression
Check this box if you want the data passing through the tunnel to be compressed. Fast
LZO compression is used.
Tunnel Type
Only L3 tunnels are supported.
VPN subnet local IP address
Virtual IP address of this VPN endpoint.
VPN subnet mask
The subnet mask associated to the IP address of this VPN endpoint.
Tunnel MTU
Encapsulated MTU, should be adjusted to avoid fragmentation; the default of 1419
bytes allows the default SHA1 digest.
Keepalive period
The keepalive mechanism verifies that the VPN link is always valid. A probe is sent by
each peer at the frequency defined by this parameter. The keepalive period is given in
seconds.
Keepalive timeout
This is the Keepalive timeout value, in seconds. The connection is closed if no packet is
received for a period longer than this period of time. The Keepalive timeout value must
be greater than the Keepalive period
LOCAL ROUTES
This section allows to define the routes to be installed in the local IP stack.
TARGET NET:
Destination subnet.
NETMASK:
Destination subnet mask.
GATEWAY:
The gateway that must be used to reach the target network. If left blank, the gateway
defaults to the VPN remote address.
METRIC:
Sets the metric for this route.
USERS VALIDATION
This section is used in Server mode only; it lists users allowed to connect to this VPN
instance. Optionally you can enable routing from the server to a client-side subnet.
CLIENTS ROUTES
This section is used in Server mode only. It lists the routes enforced by the server in the
client at connection time. If the gateway is not indicated, it defaults to the server's
address.
Warning, the routes can only be enforced by the server with TLS VPN authentication: you
must choose PKI certificate in the Auth/Crypto tab described below.
AUTH/CRYPTO
These pages allow define the credentials, encryption and authentication methods for your
VPN tunnel. For more information about the definitions of these fields, please refer to the
OpenVPN documentation:
https://community.openvpn.net/openvpn/wiki/SecurityOverview
Client settings
VI.1.7 Bridging
In this section, you can configure the bridging services integrated in your product.
VI.1.7.1 STP/RSTP
In this section, you can configure STP/RSTP for your Network Ports and Bridges.
To configure STP/RSTP on a given Network, Bridge must be enabled.
STP/RSTP overview
Click edit button to change the STP/RSTP parameters for the given bridged network
STP/RSTP Bridge settings
Max age
The maximum age of the information transmitted by the Root Bridge.
Forward delay
The delay to transition Root and Designated Ports from Discarding to Learning or from
Learning to Forwarding states.
Max hops
The maximum number of hops the BPDU can be forwarded.
Hello time
The interval between periodic transmissions of Configuration Messages by Designated
Ports.
Hold count
The maximum number of BPDUs that can be sent in one second
Priority
Bridge priority in the STP/RSTP topology, the range is 0 to 15, with 0 the highest priority
and 15 the smallest one. It will permit to select the root bridge.
Path Cost
The Port’s contribution, when it is the Root Port, to the Path Cost to reach the Root
Bridge. When set to 0, the value will be calculated automatically depending on the port
speed. The port offering the lowest cost to the root bridge will become the root port,
and all other redundant paths will be placed into blocking state.
Edge Port
Initial edge state of the port. If set to true, initial state will be set to edge port, if set to
false, the initial state will be set to non-edge port, and if set to auto, the product will
detect automatically the port type. The RSTP will make transition the edge ports directly
to forwarding state.
BPDU Guard
Set it to true on edge ports (port attached to a LAN with no other bridge attached), if
you want the port to be disabled upon the reception of a BPDU.
P2P Mac
This will set the initial point-to-point link state. If set to true, the initial link state will be
set to point-to-point link (Direct link between two bridges (without an intermediate
equipment like a hub between the two bridges)), this will help designated port to
transition faster to forwarding state. If set to auto, the product will detect automatically
the link type
Priority
Port priority inside the bridge. If in the bridge, several ports offer the same path cost,
STP/RSTP will use the port priority to elect the root port. The range is 0 to 15, with 0 the
highest priority and 15 the smallest one.
VLAN description:
Friendly name for the setting.
VLAN ID:
The VLAN ID.
Default VLAN ID:
If checked, all ingress untagged traffic will be placed in the VLAN. Only one VLAN per
port can be the default.
Default priority:
Select the priority. This option is available only if default VLAN ID is checked.
Egress untagged:
If checked, the VLAN tag will be removed from the frame before forwarding.
Interface:
Selects the port to apply the VLAN settings to.
All relevant VLANs should be configured on every interface of the bridge.
When you enable the Bridge VLAN, the untagged frames will be dropped for security
reasons. All untagged frames should be placed in a specific VLAN by configuring a default
VLAN on the originating port.
If you want to access the product through a port without VLAN tags:
Add VLAN on the Bridge interface itself (bridge upper layer interface), check default VID
and egress untagged option on the required port
Add the same VLAN on all interfaces where you want access the product. Check the
default VID and “egress untagged” option.
This VID value must not be in use by another VLAN (or its traffic will be mixed with non
VLAN traffic).
The pictures below show a simple configuration to have a product access from LAN 1 or
LAN 2 without VLAN.
Edit group
Description:
You can assign a symbolic name to the group.
Mac frame type:
Select the layer 2 frame type.
• No filter: No test on mac layer
• Unicast: Check if the frame is unicast type.
• Broadcast: Check if the frame is broadcast type.
• Multicast: Check if the frame is multicast type.
Check MAC:
This field is visible, only if Mac frame type is different from no filter
• Src Addr: Check the frame type on source MAC address field
• Dest Addr: Check the frame type on destination MAC address.
Network Proto:
Select the layer 3 protocol
• No filter: No test on Layer 3
• ARP: Check if it is an ARP frame
Name:
Friendly name for the zone.
Enable IP Masquerading:
Enables NAT/PAT on this zone. Check this option only on zones which contains public
interfaces.
MSS clamping:
Reduces the MSS (Maximum Segment Size) if the interface uses a smaller MTU.
Traffic forwarding
Use this section to forward traffic to the private side when the NAT/PAT (IP Masquerading)
is enabled.
For each frame received by this zone with matching source IP, frame protocol and public
destination port, the frame’s destination port and destination IP address will be rewritten as
specified.
Name:
Rule name. You can assign a symbolic name to the rule.
Source IP:
Sets the expected source IP of the input frame. If this field is blank, any IP match.
Frame Protocol:
Sets the expected protocol type: UDP, TCP, TCP & UDP or all.
Public port:
Sets the expected destination port of the input frame on this zone. You can specify
either a single port or a port range (using a dash “-“ between the starting and ending
ports). If this field is blank, any port will match.
Private Port:
The NAT/PAT will replace the original destination port by this private port in the frame
before sending it on the private side. If this field is blank, the port (or port range) is left
unchanged. If a public port range is used, the private port must be a port range of the
same width.
Destination IP:
The NAT/PAT will replace the original destination IP address by this private IP address in
the frame before sending it on the private side. This field cannot be blank.
NAT 1:1
Use this section to define the virtual IVPV4 networks that will be used to forward traffic
from the source zone to the defined destination zone network. IP Masquerading must be
disabled to use NAT1:1.
Source IPV4 Network:
Define the starting virtual address used for the 1:1 mapping.
Destination Zone:
Select here the destination zone among the different zones previously created.
Destination IPV4 Network:
Define the physical destination IPV4 Network. This subnet must be accessible in the
destination zone.
Network Mask:
The network mask defines the size of the translated network:
255.255.255.255 1 translated IP addresses
255.255.255.192 64 translated IP addresses
255.255.255.128 128 translated IP addresses
255.255.255.0 256 translated IP addresses
255.255.0.0 65 536 translated IP addresses
255.0.0.0 16 777 216 translated IP addresses
Please note that, on the source network, it is necessary to define the router as the default
gateway, or to create a static route to the router, to be able to access the translated subnets
of the destination zone.
On the destination networks, the return path to the source network must also be defined in
the same way. Creation of IP aliases may be required for this purpose.
Firewall
This section it used to restrict or allow the use of services provided on the device (locally
in the product) or in another zone.
Source IP:
The IP source address of the packets to be filtered.
Destination IP:
The IP destination address of the packets to be filtered.
Frame protocol:
The protocol type: TCP, UDP, TCP & UDP, ICMP, GRE, all
Port:
The destination port of the traffic. The port identifies the service.
Action:
One of:
Forward: Forward traffic to the destination zone or device
Reject: Drop packet and send ICMP message to the traffic source
Drop: Drop packet without ICMP message.
Destination zone:
Zone where traffic will be forwarded.
Target:
Destination host or network IP address.
IPv4-netmask:
If the target is a network, you must set this field to the correct netmask.
If the target is a host, you can leave this field blank.
Metric:
Sets the metric for this route. Leave blank to use the default of 64.
MTU:
Set the MTU for this route. Leave blank to use the computed value.
Specific:
This column indicates the static routes that are automatically created by network
services.
Ajdusts the quantity of messages sent to the system log. Warning: the system log must
be set to at least the same level in order to handle the messages.
Enable Bootstrap Service:
Check this to allow this device to be a BSR candidate.
RendezVous Point candidate:
Check this to allow this device to be a RP for the groups listed in the local rendezvous
point configuration section.
Rendezvous Points tab
Condition threshold:
which throughput will trigger the switch to SPT. The unit depends on the above choice.
Query interval:
the delay between two successive IGMP queries.
Other querier present timeout:
the delay after the last IGMP query was seen on a network interface, before this router
takes over the IGMP querier role on this interface, in the assumption that the previous
querier went down.
Advanced settings tab
Hello periodicity:
duration between two successive “HELLO” PIM messages (advertising existence and
priority of a PIM router).
Default route metric:
the route metric value sent in ASSERT messages if no metric is set for the network
interface where ASSERT is sent.
Default route preference:
the preference metric value sent in ASSERT messages if no preference is set for the
network interface where ASSERT is sent.
Debug classes:
when the log level is set to “Debug”, this comma-separated field indicates the classes of
debug messages sent to the log. This field is reserved for advanced technical support.
ADD button:
click here to add a new block of groups.
Red cross buttons:
click here to delete a block of groups.
Multicast group prefix:
in each line, write the prefix (the common beginning) of group IP addresses, followed by
a “/” and the number of significant bits in the prefix.
This router will handle all groups beginning with one of the prefixes in the list.
Remote rendezvous points configuration
Here you list groups that are handled by a remote RP but you cannot rely on a BSR to
advertise it. BSR is still used for other groups.
ADD button:
Click here to add a new block of groups.
Red cross buttons:
click here to delete a block of groups.
Multicast group prefix:
the common beginning of group IP addresses, followed by a “/” and the number of
significant bits in the prefix.
Rendezvous point:
enter the address of the rendezvous point managing this group block.
This router preloads the list at startup and uses these associations to find the remote RP
for the designated groups. For the purpose of RP election, these static associations have
a priority of 1 (highest).
VI.1.9 QOS
VI.1.9.1 Frame tagging
The DSCP tag applies on each incoming frame (from any interface) that matches the
following criterions:
PROTOCOL:
The IP protocol type. This can be TCP, UDP or ICMP.
SOURCE IP ADDRESS:
The source IP address of the incoming frame. Wildcards are not allowed.
DESTINATION IP ADDRESS:
The destination IP address of the incoming frame. Wildcards are not allowed.
SOURCE PORT:
The source port of the incoming frame. This parameter is valid for TCP & UDP protocols
only (see above). You can specify either a single port or a port range
DESTINATION PORT:
The destination port of the incoming frame. This parameter is valid for TCP & UDP
protocols only (see above). You can specify either a single port or a port range
DSCP VALUE:
The value to be written in the DSCP field (6 bits) of the IP frame.
You can use the following table to set WMM valid tags:
WMM valid tags
DSCP field value WMM Queue
8 or 16 Background (BK)
0 or 24 Best effort (BE)
32 or 40 Video (VI)
48 or 56 Voice (VO)
To map a traffic class to a given queue/priority, check the enable box and select the
Queue number for each TCx traffic class. For Wi-Fi interfaces, WMM is always active and
the queue mapping is imposed and cannot be changed
Queue management
To select the queue management type, select the queue type for each QUEUE x
VI.1.9.3 WMM
The page displays the WMM parameters for the selected profile. WMM (a.k.a. WME) is
always available.
WMM parameters for profile :
This listbox allows you to select User or Default QoS parameters. Default QoS parameters
are given for reference and cannot be modified.
AP PARAMETERS:
This table allows you to change the WMM parameters for the four Access Point Tx
queues (BK, BE, VI, VO).
CWMIN:
Defines the minimum contention window size (expressed in number of time slots).
Allowed values are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023.
CWMAX:
Defines the maximum contention window size (expressed in number of time slots).
Allowed values are 1, 3, 7, 15, 31, 63, 127, 255, 511, 1023.
AIFS:
Defines the arbitration inter-frame spacing value for the current queue size (expressed
in number of time slots). Allowed values are 0 to 255.
MAX LENGTH FOR BURSTING:
Defines the maximum burst length (expressed in milliseconds with precision of 0.1 ms).
Allowed values are 0 to 100000ms.
CLIENT Parameters:
This table allows you to change the WMM parameters sent by the CLIENT in its
management frame.
CWMIN:
Defines the minimum contention window size (expressed in number of time slots).
Allowed values are 0 to 12.
CWMAX:
Defines the maximum contention window size (expressed in number of time slots).
Allowed values are 0 to 12.
AIFS:
Defines the arbitration inter-frame spacing value for the current queue (expressed
in number of time slots). Allowed values are 1 to 255.
TXOP_LIMIT:
Defines the tx opportunity limit duration (expressed in number of time slots).
Allowed values are 0 to 65535.
ACM:
Defines the Admission Control Mandatory for the current queue. Allowed values
are 0 and 1.
VI.1.10 Services
VI.1.10.1 Alarms / events
This page allows you to monitor various events in order to trigger actions. Using the Add
button, you can define several triggers and give them mnemonic names.
Once trigger names have been created, you can set their event source and their associated
action. The event source and the action may need extra parameters depending on their
type. A summary help is displayed above the events table.
Enter a symbolic name for your event and click the Add button to add a new entry.
Events:
Ethernet link: The state is up when the link is up on the physical interface.
Wireless link (in Access Point mode): The state is up when one client is connected on
any of the access points running on the product.
Wireless link (in Client mode): The state is up when the bridge is connected to one
Access point.
Cellular link (only with LTE products): The state is up when the cellular link is
established.
Wireless client assoc: The event can be linked only with the SNMP trap action. It sends
a notification when a client associates or dissociates with one access point.
Digital input (Only on product with digital input): The state is 1 when the digital input
is active. Some products, such as the Airbox, have several Digital Input.
Input Power (Only on product with 2 input powers): The state is on, when the input
power is powered.
Temperature limit: The event is triggered when the temperature exceeds the trigger.
VRRP state change: The event is triggered when VRRP state enters or leaves the given
value.
DFS state change: The event is triggered when the DFS status changed
Cold start: The event is triggered when the product has finished booting.
Pinger: An ICMP ECHO Request (ping) is periodically sent to a remote host. If no ICMP
ECHO Response is received for several consecutive periods, the event is triggered.
GNSS state (only with LTE products): The event is triggered when the GNSS position
stabilizes and can be queried. It deactivates when the position fixing is lost.
SNMP trigger: The event is triggered by SNMP OID “adminTriggerEventEnable” or
“adminTriggerEventTrigger”
Actions:
Alarm output: This action only exists in some products. Some products, such as the
Airbox, have several digital outputs that can be programmed as alarms. When
triggered, the alarm contact will be activated as specified in the product quick
installation guide.
SNMP: The SNMP Trap action, when triggered, will send the relevant trap to the
specified manager address using the specified community.
Wlan shutdown: the Wlan shutdown action, when triggered, will shut down the
associated radio interface.
L3 network toggle: switch the specified network up or down
Alter VRRP: This action allow to change the priority of a VRRP group, and then can be
used to causes a switch over. It is in principle triggered by an SNMP trigger
Basic tab
Enable connection tracking:
this enables the connection replication service.
Network for messages exchange:
network device used to send connection descriptions to the backup router. You can use
either a subnet used by VRRP, or a dedicated network. Since this link must be reliable, a
dedicated link is preferred, and a wired link is preferred over a wireless link.
Log to system log:
event messages are sent to the system log to be read later by an administrator.
Advanced tab
Multicast IPv4 address:
the multicast destination address used to send connection replication messages. It can
be changed if some other user application uses the same multicast address.
Conntrack group:
the replication service uses a standard protocol named conntrack. If several instances of
this service exist in other devices of the subnet, you can tag messages for your backup
by dedicating a “group number”.
Process priority:
the higher the priority, the faster the replication, but also the higher the network load
dedicated to replication. Also, a high priority with many connections may adversely
affect the roaming delay.
Dynamic DHCP:
If unchecked, only static leases will be authorized (see below)
Force:
By default, the DHCP service doesn't start if it detects the presence of another DHCP
server on the network. If this option is checked, the DHCP server won't check for the
presence of another server before starting.
Ipv4-Netmask:
This option override the default netmask value sent to DHCP clients.
DHCP-Options:
This field allows you to enter an additional DHCP option (enclosed into quotes). Syntax
depends on the option itself. See DHCP RFCs for more information about DHCP options.
STATIC LEASES:
Active only in DHCP server mode, this option allows to always give the same predefined
IP address according to a given client MAC address.
DNS relay
These options enable DNS protection Attack.
DHCP RELAY
Password
Enter your password. This password will be used for example when you will set the
product IP by Acksys NMS.
VI.1.10.5 Passpoint
Before adding a Passpoint configuration, you must define the profiles that will be used. All
the necessary information must be given to you by your provider
Passpoint Config Profiles
The Passpoint configuration profile can be summarized in 2 types: HS20 profile and ANQP
profile. HS20 profiles configure hotspot 2.0 functionality while ANQP profiles configure
ANQP 802.11u functionality.
Operator friendly name: This parameter can be used to configure one or more operator
friendly name entries. Each entry has a two- or three-character language code (ISO-639)
and an operator name string.
Hs20_conn_capab: This can be used to publicize the type of IP traffic that may be sent by
the hotspot (eg due to a firewall allowing/blocking protocols/ports).
Symmetric: Check this box if the WAN link has the same speed in both uplink and
downlink directions
Link at capacity: Check this box to indicate that the WAN link has reached its maximum
capacity. If this setting is enabled, no additional mobile devices will be allowed to
associate with the hotspot access point.
Download/Upload speed: Estimate of the current WAN link downlink/uplink speed in
kbps.
Down/Up link load: Current load of the downlink/uplink WAN connection in percentage.
WAN metrics load measurement duration: Duration of downlink/next load
measurement in milliseconds; 0 if the load cannot be determined.
Operating class
Operating class: List of operating classes used by BSS in this SSE. The global operating
classes in Table E-4 of the IEEE 802.11-2012 appendix E standard define the values that
can be used in this context. (https://tinyurl.com/yxs4ctde)
In this example: 81 and 115 indicate the AP to use channels 1-13 and 36, 40, 44, 48. See
the tables below.
OSU server URI: If a client chooses this OSU (Online Signup Server) Provider, he will use
this URI for registration.
OSU friendly name: A human readable name to identify the OSU Provider.
OSU NAI: The identifier with which a client connects to an OSEN AP defined by Passpoint
config.
OMA DM: OSU server supports OMA DM (Open Mobile Alliance Device Management)
provisioning protocol (Hotspot_2.0_Specification_v2.0: 8.3 Provisioning using OMA DM)
SOAP XML: OSU server support provisioning protocol SOAP XML (Simple Object Access
Protocol XML) (Hotspot_2.0_Specification_v2.0: 8.4 Provisioning using SOAP XML)
OSU icon: displayed with OSU friendly name
OSU service desc: description of the service
Note: A Passpoint configuration can contain several OSU Provider profiles
ANQP Venue
Roaming Consortium
Authentication type: If a Passpoint is configured with ASRA (Additional Step Required for
Access), an ANQP network authentication type profile is mandatory to apply to this
configuration
Use this profile to specify the types of IPv4 and IPv6 addresses available in the access
point network.
The Domain Name list item provides a list of one or more domain names of the entity
that operates the IEEE 802.11 access network.
Note that the client's NAI corresponds to one of the ANQP Domain name, the client will
also try to connect to this AP.
3GPP cellular network info is a duplicate list consisting of MMC and MNC, which is used
to identify an operator.
MMC: Mobile country code, MCC is a three-digit country code, standardized by the
International Telecommunication Union (ITU) in its recommendation E.212, for mobile
telephone networks, more particularly in GSM and UMTS technologies. For example:
MMC from France is 208.
MNC: Mobile network code, MNC is used in combination with the Mobile country code
(MCC) for unambiguous identification of the network of a mobile network operator using
the GSM, CDMA, TETRA, UMTS, LTE and certain mobile satellite networks . For example:
3gpp code from Orange is MCC = 208, MNC = 01
Each NAI Realm can optionally be associated with a set of EAP methods. Each EAP
method can optionally be associated with a set of authentication parameters. The NAI
domain information provides a clue to the methods an STA can use to establish an
association in an IEEE 802.1X RSN environment. If the STA recognizes the NAI domain, it
can attempt authentication even if it thinks the EAP methods are incorrect.
Note that a Passpoint config can have multiple ANQP NAI Realm profiles enabled.
Additional ANQP elements with arbitrary values can be defined by specifying their
content in Hexdump format. Note that these values will override the contents of ANQP
elements that may have been specified in the higher layer configuration parameters.
Passpoint icon
Passpoint Config
The passpoint configuration consists of several “passpoint config profiles”. A series of
profiles must therefore be established before proceeding with the configuration of the
passpoints.
Access network type: This option indicates the type of network that will be connected
after the association. The available types are:
• Private network
• Private network with guest access
• Chargeable public network (paying public network)
• Free public network
• Personal device network
• Emergency services only network
• Test or experimental
• Wildcard (general network)
Provide internet connectivity: If the internet is available after pairing.
Additional Step Required for Access (ASRA): If additional measures are required for
network access. Note: if this option is enabled, a valid “Network authentication type”
profile must also be applied.
COMMUNITY CONFIGURATION
In this section, you can find the list of communities, their access rights and restrictions on
who use them. It relies on the SNMP v1/v2c community based security model.
Warning: if you change the public community properties, you must ensure that any SNMP
client is set up accordingly. For example, the Acksys WaveManager software has a menu to
change communities on a per-device basis.
Access rights are defined in the “community configuration” subsection. To add an access
rights specification, type in a nickname for the specification and click on the Add button.
The nickname must be composed of letters, numbers and underscores. The nickname is
not the community name, it is an access rights specification name.
By default, the private community is defined but inaccessible, for historical compatibility
reasons. You can redefine the default communities at will.
Community:
The identification name that must be provided to the SNMP client in order for it to
identify against the agent. You can use the same as the nickname, if you need to.
Security Name:
The Security Name that will be used to set the access right in the VACM section.
Access IP base:
An IP address which is allowed to use this specification. If the DNS server is properly
configured in the Setup/Network page, or obtained from a DHCP server, you can type a
host name (a FQDN) instead.
Access IP range:
An IP mask which is applied to the IP base to determine the full range of allowed client
IP addresses.
Refresh button:
Click on the refresh button, to synchronize with the user data base of the SNMP agent
(since in SNMP v3, users can be created remotely with SNMP v3 commands).
This will also apply the saved changes on SNMP configuration.
Add user button:
Click on Add user button, to create a new SNMP v3 user.
Authentication type:
Supported Authentication types are: SHA-512, SHA-384, SHA-256 and SHA-224
Supported Privacy protocols are AES-256, AES-192 and AES.
SHA1, MD5 and DES are also supported for compatibility, but marked as unsecure. They
will certainly be removed in a future version, so we recommend not to use them.
3) Set the access rights on the View for the Group depending on the user security
model and security level.
VI.1.10.7 Statistics
The system counters graphs display the product performance as a timing diagram by
collecting data periodically.
Statistic related services are disabled by default. Please check Enable statistics system in the
OVERALL SETTINGS to activate these functions.
When statistical services are enabled, you can set the data collection interval (every 30
seconds by default).
When graphs are enabled, the product collects the wireless signal level received by its
wireless client from the AP, and tx/rx traffic data of network interfaces in real time. In the
STATUS page, you can display collected data in graphical format with various display
durations (see sections VI.3.2 Network and section VI.3.6.1 Associated Stations)
The collection of telemetry information, GPS statistics, roaming statistics and GPS statistics
is activated and automatically configured by WaveManager when it is launched or when
these services are activated. It’s possible to locally deactivate these services, but
modification of the parameters is reserved for future functionalities not yet implemented.
VI.1.10.8 VRRP
In this page you will add the VRRP instances and their associated virtual IP address. Then
you will create the VRRP groups, listing their instances and the properties common to all
instances.
Before creating the instances, you must define all the needed subnets and their properties
in the SETUP/NETWORK section.
If you are setting up a NAT or PAT router, you will need to enable the connection tracking
service as well (see Connection tracking).
Priority:
used for negotiation when several backups are set up. The default values assign a
sensible value depending on the initial role.
Virtual router IDs:
a multi-selection box to select instances in the group.
Support connection tracking:
check to transfer connection information from the active router to the inactive one.
Enable
Allow use of the location service.
Serve external clients
Allow devices outside of the product to query its position using the gpsd protocol. If
disabled, the position can still be queried with SNMP, displayed on the Status→Device
Information page, or logged to an external log server.
Listen port
Change TCP server port for external clients.
Position logging period
Periodically add an entry in the system log indicating current position.
URI for map link
The current position that appears on the Status→Device Information page is embedded
in a web link, allowing for example to display a map using external services. Here you
can choose among renown public services, or set up a link to your preferred web server.
To disable the link entirely, choose custom and enter a dash or a hash mark (anything
but a column). If the string %1 appears in the link, it will be replaced with the latitude,
and %2 will be replaced with the longitude.
For the HTTPS server, you can upload a web certificate file (PEM format). The certificate file
is verified and uploaded when you Save or Save & Apply
VI.1.10.11 WAC
SERVICES/WAC menu allows to configure the WLAN Association control system
Products equipped with a cellular radio provide this function to upgrade the firmware of
the embedded radio card.
Do not attempt to upgrade the cellular firmware unless the Support service provides you
an adequate firmware file and related instructions.
Check the current cellular firmware identification before upgrading, as all upgrades do not
apply to all versions.
VI.2.3 System
VI.2.3.1 Device Local settings
Host Name:
This is the name of the device. It can be changed the DHCP setting when the unit is
configured as DHCP client. This text will be shown in the Device Info STATUS page.
System time and Time Zone:
Allows to set the current time and select your time zone.
ATTENTION: local time setting is lost at each reboot. No battery is provided to keep time
accuracy during power off. Use a time server if needed.
Device Location:
This text will be shown in the WaveManager Location column, in the SNMP sysLocation
value and in the browser caption.
If the NTP server is reachable on the network, the product can use it to configure its local
time.
One can use either IP address or domain name but the use of domain name requires
configuring one or more DNS server addresses in the Network configuration section.
LINK DIAGNOSTIC:
This panel provides two standard UNIX tools: ping and traceroute. Place the argument in
the text field above the corresponding button and then click the button. The results will
be displayed in a frame below.
You can use either an IP address or a domain name but the use of domain name
requires to configure one or more DNS server addresses in the Network configuration
section.
BANDWIDTH TEST:
Here you can perform an iPERF test, either in Server or Client mode, using TCP or UDP
protocol. DELAY defines the duration of the test in seconds, while DISPLAY defines the
status lines display interval in seconds.
C-KEY Management:
Erase C-KEY:
This option will erase all the C-KEY contents. This has to be done before the first time
you will copy configuration to the C-KEY.
Copy configuration to C-KEY:
This option will save your current configuration into the C-KEY. The configuration
previously stored in the C-Key is kept in the C-Key as a backup; if the new configuration
becomes damaged the backup will be loaded instead at boot time.
WARNING: the WPA keys and the various certificates (802.1x, HTTPS) will be copied as
well. Anyone coming into possession of the C-Key can extract this information if no
administration password has been defined.
Ignore C-KEY setting:
This option, if checked, will prevent the product from loading the C-KEY configuration at
start-up. Otherwise the C-Key contents will overwrite the internal configuration files at
boot time (default behavior).
Disable C-KEY led:
This option, if checked, will turn off the C-KEY status led permanently. This is useful if
you don’t have any C-KEY and do not want to see the permanently red C-KEY status LED.
This can also be used to slightly reduce power consumption in case of embedded
system.
Reset And Reboot:
Reset to factory settings:
This option will restore the default product settings.
Reboot your device:
As its name suggests, a click on this button will reboot the device.
General settings:
This section is about configuring the system log.
System Log Output Level:
Sets the minimum seriousness of a message to allow its insertion in the system log.
External System Log Server and Port:
Optional remote log server configuration. IP address and UDP port where the log
messages will be sent using the syslog protocol. Leave empty to disable.
Log settings:
These sections are used to configure logging for various services. The messages are
sent to the system log if their seriousness is above the configured level.
So, the log messages go through two rounds of filtering: one in the specific service and
one in the syslog service. Please make sure the system log output level is high enough
to display all required messages.
Verbosity Level:
Sets the minimum seriousness of a message
relating to the OpenVPN server to allow its
insertion in the system log.
To change the target of the link appearing with valid GNSS info, please refer to GNSS Agent
configuration
VI.3.2 Network
This page summarizes the network interfaces configuration and displays transmitted and
received packets counts.
You can also configure the display duration to 10 minutes, 1 hours, 1 day, 1 week or 1
month.
VI.3.3 Routes
VI.3.4 Bridges
This page displays the port statuses of the STP/RSTP bridges, if there are bridges with
STP/RSTP enabled in the product.
Point to Point: Set to true if the port is connected to a point to point media (connected
directly to another switch with a cable), otherwise set to false.
VI.3.6 Wireless
VI.3.6.1 Associated Stations
If the radio card is in access point mode, this panel will list the clients connected to it and
display RF signal properties.
If the radio card is in client mode, when it’s associated with an access point, its RF details
will be listed on this panel.
The signal level displayed is the one obtained from the last frame received, whatever its
type (data or management) or modulation kind. So, it is not comparable to the values
appearing in the site survey, which concern only probe and beacon frames.
Also, the signal level can vary a lot depending on the traffic. When data is received with a
high MCS value, the signal can be low because typical transmitters are less powerful at high
speeds; when no data is received the signal may raise because it is taken from low-rate
beacons.
No associated station
You can display the statistic graph about signal strength by pressing the statistic graph icon
. The statistic graph is only available for client mode. If the radio card is in access point
mode, the statistic graph icon will be disabled.
Signal Level graph: It displays signal level in dBm for wireless interface in real time.
You can also configure the display duration to 10 minutes, 1 hours, 1 day, 1 week or 1
month.
DST Address:
MAC address of the final destination.
Next Hop:
MAC address of the next mesh node in order to reach “DST Address”.
Metric:
Represents the total cost of this mesh path (less is better).
Discovery Timeout:
Displays the current discovery timeout for this mesh path (in milliseconds)
Discovery retries:
As its name implies, displays the number of discovery retries.
Status:
Displays the mesh path current state.
Must be one of the following:
- Active : this mesh path can be used for forwarding
- Resolving : the discovery process for this mesh path is running
- Resolved : the discovery process ends successfully
- DSN Valid : the mesh path contains a valid destination sequence number
VI.3.6.4 Service status
Service status gives complementary information about the current state of the wireless
interfaces. The STATUS field gives in particular useful information on the state of DFS
channels.
On dual radio products, you can select the radio card with which you want to perform the
site survey. Click on Scan Radio to start the survey. This operation may take a few minutes.
Please note that during the scan period, the radio card can no longer perform the function
for which it is programmed. If, for example, it is configured as an Access Point, all associated
clients will be temporarily disconnected. Also note that the site survey can work even when
the radio card is not activated.
Attention, a disturbed environment can prevent the detection of certain Access Points, so it
is not abnormal to have significantly different results between two successive site survey.
The first panel displays a radar view of the detected access points, and below the measured
electromagnetic noise level. You can display the 2.4GHz band or the 5GHz band by clicking
on the respective tabs.
We can see in the example below the presence of an electromagnetic noise around the
frequency of channel 7. This noise is of non-Wi-Fi, because there is no access point on this
frequency.
The lower table lists all the access points that could be detected.
Please note that the signal level of each detected Access Point is taken from probe and
beacon frames only, which are sent at the lowest available rate. In general, the signal level
found for these frames is better than the one from data frames.
The Join button in the right column of the result line does not appear if the SSID is hidden.
You can click on this button to connect to this Access Point
Wireless interface allows to choose whether you want to replace the existing configuration
or create a new instance on the radio card. This last option is not possible if the current
configuration is already in the client (you cannot have more than one client role on a radio)
Configuration complete
VI.3.7 Cellular
This page summarizes information about the cellular radio operation.
Cellular interfaces
Radio Network interface name
SIM state Presence, PIN code state…
IMSI Unique identifier of the SIM
IMEI Unique identifier of the radio client
Model Radio card model, version, geographic region
Attached “home” uses the SIM native operator, “roaming” uses an allowed operator
Operator Operator name, MCC and MNC
LAC/CID Base station location and ID (operator specific)
Access technology – GSM or CDMA
RSSI Signal quality estimator
BER Bit Error Rate estimator; estimated number of errors per 10000 bits (see
3GPP TS 45.008)
Scan Starts a scan to detect available operators around
When this message appears in the status page, it means that the PIN code has not been
entered or is incorrect. Please note, after three attempts to start in these circumstances, the
SIM card may be locked
VI.3.8 Services
VI.3.8.2 VRRP
This panel displays the current state for the VRRP instances and groups
configured in the product.
Here you can see that two virtual gateways are set up in this product. The first
one is named “routeA” and groups virtual interfaces 101 and 201. It is
currently inactive, because a master is detected on both interfaces.
The virtual gateway “routeB” is currently actively routing packets between
virtual interfaces 102 and 202.
VI.3.9 Log
This panel allows visualizing the product logs.
The Config log displays a summary of the unit configuration, to verify that
there are no inconsistencies in the configuration.
The kernel log displays log messages from the Linux kernel only. It is not
filtered, i.e. it includes all recent messages sent by the kernel.
The system log displays log messages from both the kernel log and from the
running services. The messages in this log are limited to the importance levels
configured in the Setup/Tools/Log setting page.
In client mode, you can optionally display, in the system log, messages relating
to the roaming process (see section VI.1.2 Advanced roaming tab). Please refer
to the following table for the signification of the symbols surrounding the
BSSID’s (MAC addresses) displayed in these messages:
[B1:B2:B3:B4:B5:B6] BSSID of the current AP
*B1:B2:B3:B4:B5:B6* BSSID of the AP selected for the next roaming
/B1:B2:B3:B4:B5:B6/ AP discarded by the ‘matching SSID’ test
tB1:B2:B3:B4:B5:B6t AP discarded by the ‘no return’ test
mB1:B2:B3:B4:B5:B6m AP laid aside by the ‘minimum signal level’ test
MB1:B2:B3:B4:B5:B6M AP laid aside by the ‘maximum signal level’ test
Configuration summary:
In this example, we are using 802.11a with 20MHz HT mode, channel 36,
country code FR and ACKSYS as ESSID. You can obviously change any of these
parameters as long as your choice makes sense.
Product A Product B
Device Configuration Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11a 802.11 mode same as product A
HT mode 20MHz HT mode same as product A
Channel 36 Channel same as product A
Country code FR Country code any
Interface Configuration 1 Interface Configuration 1
Parameter Value Parameter Value
Role Access Point Role Client
ESSID ACKSYS Bridging mode 4 addresses format (WDS)
ESSID same as product A
Configuration summary:
In this example, we are using 802.11na with 40MHz above HT mode, channel
36, country code FR, ACKSYS as private ESSID and SYSKCA as public ESSID. You
can obviously change any of these parameters as long as your choice makes
sense.
Product A Product B
Device Configuration Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode same as product A
HT mode 40 MHz above HT mode same as product A
Channel 36 Channel same as product A
Country code FR Country code any
Interface Configuration 1 (Public) Interface Configuration 1
Parameter Value Parameter Value
Role Access point Role Client
ESSID SYSKCA Bridging mode 4 addresses format (WDS)
Interface Configuration 2 (Private) ESSID same as product A private
ESSID
Parameter Value
Role Access point
ESSID ACKSYS
WaveOS product
Configuration services
And TCP/IP
IP address from DHCP No IP address
“office” “production”
bridge bridge
Wi-Fi Ethernet
Radio A LAN1
Configuration summary:
In order to achieve this configuration using the browser interface, you must
change things in order:
- In the “virtual interfaces” menu, create the VLAN interfaces above the
Ethernet LAN
- In the “physical interfaces” menu, set wireless radio settings and create
one “access point” interface per needed SSID
- In the “network” menu, create one network per virtual network and use
it to associate the VLAN from the Ethernet, with the SSID from the
wireless radio.
Configuration summary:
In this example, we have two different configurations (one per radio card).
Product A Product B
Device Configuration 1 (Radio A) Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode 802.11na
HT mode 40 MHz above HT mode 40 MHz above
Channel 36 Channel 44
Country code FR Country code FR
Interface Configuration 1 (Radio A) Interface Configuration 1
Parameter Value Parameter Value
Role Access point Role Client
ESSID Private Bridging mode 4 addresses format (WDS)
Device Configuration 2(Radio B) ESSID same as product A private
ESSID
Parameter Value
Enable device on
802.11 mode 802.11na
HT mode 40 MHz above
Channel 44
Country code FR
Interface Configuration 2 (Radio B)
Parameter Value
Role Access point
ESSID Public
Configuration summary:
In this example, we are using the same parameters than previously with a
roaming threshold set to -60dBm and a 5s scan cycle period.
Products A, B, C Product D
Device Configuration Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode same as product A
HT mode 40MHz above HT mode same as product A
Channel 36 Channel same as product A
Country code FR Country code any
Interface Configuration 1 Interface Configuration 1
Parameter Value Parameter Value
Role Access point Role Client
ESSID ACKSYS ESSID same as product A
Roaming
Parameter Value
Enable proactive roaming on
Channel same as product A
Current AP minimum level -60
Delay between 2 5000
successive scan cycle
Configuration summary:
In this example, we have two different configurations (one per radio card). You
can obviously change any of these parameters as long as your choice makes
sense.
For Radio A:
Mode: 802.11ng, HT mode: 20MHz, channel: 11, country code: FR, ESSID:
ACKSYS1.
For Radio B:
Mode: 802.11na, HT mode: 20MHz, channel: 36, country code: FR, ESSID:
ACKSYS2.
ATTENTION: This topology creates a network loop. You must provide a way to
cut one of the two Wi-Fi links. This is usually done by using STP or RSTP inside
the products. The product series provides STP since firmware 1.4.0 . STP must
be activated in both Product A and Product B. See section “Spanning Tree
Protocols (STP, RSTP)” for more details.
Product A Product B
Device Configuration (Radio A) Device Configuration (Radio A)
Configuration summary:
You can obviously change any of these parameters as long as your choice
makes sense.
Mode (Product A and Radio A for Products B, C, D, E,): 802.11na, HT mode:
20MHz , channel: 36, country code: FR, ESSID: ACKSYS.
Mode (Radio B for Products B, C): 802.11na, HT mode: 20MHz , channel: 40,
country code: FR, ESSID: ACKSYS2.
Mode (Radio B for Products D, E): 802.11na, HT mode: 20MHz , channel: 60,
country code: FR, ESSID: ACKSYS3.
ATTENTION: This topology may create one or more network loop. You must
provide a way to cut them. This is usually done by using STP or RSTP inside the
products. This products series provides STP since firmware 1.4.0. STP needs to
activated in each product. See section VI.1.5.1 Network configuration for more
details.
Product A Product B
Device Configuration Device Configuration (Radio A)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode Same as product A
HT mode 20MHz HT mode Same as product A
Channel 36 Channel Same as product A
Country code FR Country code any
Interface Configuration Interface Configuration (Radio A)
Parameter Value Parameter Value
Role Access point Role Client
ESSID ACKSYS Bridging mode 4 address format
ESSID ACKSYS
Product C
Device Configuration (Radio B)
Device Configuration (Radio A)
Parameter Value
Parameter Value
Enable device on
Enable device on
802.11 mode 802.11na
802.11 mode Same as product A
HT mode 20MHz
HT mode Same as product A
Channel 40
Channel Same as product A
Country code FR
Country code any
Interface Configuration (Radio B )
Interface Configuration (Radio A)
Parameter Value
Parameter Value
Role Access Point
Role Client
ESSID ACKSYS2
Bridging mode 4 address format
ESSID ACKSYS
Device Configuration (Radio B)
Parameter Value
Enable device on
802.11 mode Same as product B (Radio B)
HT mode Same as product B (Radio B)
Channel Same as product B (Radio B)
Country code any
Interface Configuration (Radio B)
Parameter Value
Role Client
Bridging mode 4 address format
ESSID Same as product B (Radio B)
Product D Product E
Device Configuration (Radio A) Device Configuration (Radio A)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode Same as product A 802.11 mode Same as product A
HT mode Same as product A HT mode Same as product A
Channel Same as product A Channel Same as product A
Country code any Country code any
Interface Configuration (Radio A) Interface Configuration (Radio A)
Parameter Value Parameter Value
Role Client Role Client
Bridging mode 4 addresses format Bridging mode 4 addresses format (WDS)
(WDS)
ESSID ACKSYS
ESSID ACKSYS
Device Configuration (Radio B)
Device Configuration (Radio B)
Parameter Value
Parameter Value
Enable device on
Enable device on
802.11 mode Same as product D (Radio
802.11 mode 802.11na B)
HT mode 20MHz HT mode Same as product D (Radio
B)
Channel 60
Channel Same as product D (Radio
Country code FR
B)
Interface Configuration (Radio B)
Country code any
Parameter Value
Interface Configuration (Radio B)
Role Access Point
Parameter Value
ESSID ACKSYS3
Role Client
Bridging mode 4 addresses format (WDS)
ESSID Same as product D (Radio
B)
Configuration summary:
You can obviously change any of these parameters as long as your choice
makes sense.
Mode (Products A, B, E, D, G and Radio A for Products C, F, H): 802.11na, HT
mode: 20MHz , channel: 36, country code: FR, MESHID: ACKSYS.
Mode (Radio B for Products C): 802.11na, HT mode: 20MHz , channel: 40,
country code: FR, ESSID: ACKSYS1.
Mode (Radio B for Products F): 802.11na, HT mode: 20MHz , channel: 44,
country code: FR, ESSID: ACKSYS2.
Mode (Radio B for Products H): 802.11na, HT mode: 20MHz , channel: 48,
country code: FR, ESSID: ACKSYS3.
Product A, B, E, D, G Product C
Device Configuration Device Configuration (Radio A)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode Same as Product A
HT mode 20MHz HT mode Same as Product A
Channel 36 Channel Same as Product A
Country code FR Country code any
Interface Configuration Interface Configuration (Radio A)
Parameter Value Parameter Value
Role Mesh (802.11s) Role Mesh (802.11s)
MESHID ACKSYS MESHID ACKSYS
Device Configuration (Radio B)
Parameter Value
Enable device on
802.11 mode 802.11na
HT mode 20MHz
Channel 40
Country code FR
Interface Configuration (Radio B)
Parameter Value
Role Access Point
ESSID ACKSYS1
Product F Product H
Device Configuration (Radio A) Device Configuration (Radio A)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode Same as Product A 802.11 mode Same as Product A
HT mode Same as Product A HT mode Same as Product A
Channel Same as Product A Channel Same as Product A
Country code any Country code any
Interface Configuration (Radio A) Interface Configuration (Radio A)
Parameter Value Parameter Value
Role Mesh (802.11s) Role Mesh (802.11s)
MESHID ACKSYS MESHID ACKSYS
Device Configuration (Radio B) Device Configuration (Radio B)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode 802.11na
HT mode 20MHz HT mode 20MHz
Channel 44 Channel 48
Country code FR Country code FR
Configuration summary:
Mode (Product A to Product B): 802.11na, HT mode: 20MHz , channel: 36,
country code: FR, ESSID: ACKSYS1. You can obviously change any of these
parameters as long as your choice makes sense.
Mode (Product B to Product C): 802.11na, HT mode: 20MHz , channel: 44,
country code: FR, ESSID: ACKSYS2. You can obviously change any of these
parameters as long as your choice makes sense.
This configuration allows to not share the Wi-Fi channel. In this example, Radio
A of Product B only communicates with Product A while Radio B of Product B
only communicates with Product C.
Attention: You must choose different channels for Radio A and Radio B.
Product A
Device Configuration (Radio A)
Parameter Value
Enable device on
802.11 mode 802.11na
HT mode 40MHz above
Channel 36
Country code FR
Interface Configuration 1(Radio A)
Parameter Value
Role Access point
ESSID ACKSYS1
Product B Product C
Device Configuration (Radio A) Device Configuration (Radio A)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode 802.11na
HT mode 40MHz above HT mode 40MHz above
Channel 36 Channel 44
Country code FR Country code FR
Interface Configuration 1(Radio A) Interface Configuration 1(Radio A)
Parameter Value Parameter Value
Role Client Role Client
Bridging mode 4 addresses format (WDS) Bridging mode 4 addresses format (WDS)
ESSID ACKSYS1 ESSID ACKSYS2
Device Configuration (Radio B) Device Configuration (Radio B)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11ng 802.11 mode 802.11ng
HT mode 40MHz above HT mode 40MHz above
Channel 44 Channel 36
Country code FR Country code FR
Interface Configuration 1(Radio B) Interface Configuration 1(Radio B)
Parameter Value Parameter Value
Role Access point Role Access point
ESSID ACKSYS2 ESSID ACKSYS1
Configuration summary:
Mode: 802.11na, HT mode: 20MHz, channel: 36, country code: FR, ESSID:
ACKSYS. You can obviously change any of these parameters as long as your
choice makes sense.
The repeater role is equivalent to one access point and one bridge
infrastructure in the same radio card. In the example above, product B acts as
a client of product A and as an access point with product C.
Both products A and B have the same SSID; in order to avoid associating with
itself, the repeater needs to know the BSSID of the access point with whom it
must associate with (product A in this example).
Product C is set to 4-addresses bridging mode. This is the best way to achieve
transparent communication. Other modes (like ARPNAT) would also work, but
with caveats; see section V.2.6 Wired to wireless bridging in infrastructure
mode for more information.
Product A Product B
Device Configuration (Radio A) Device Configuration (Radio A)
Value Parameter Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode same as product A
HT mode 20MHz HT mode same as product A
Channel 36 Channel same as product A
Country code FR Country code any
Interface Configuration 1(Radio A) Interface Configuration 1 (Radio A)
Value Parameter Parameter Value
Role Access point Role Client
ESSID ACKSYS Bridging mode 4 addresses format (WDS)
Multiple ESSIDs on
Configuration summary:
Mode: 802.11na, HT mode: 20MHz, channel: 36, country code: FR, ESSID:
ACKSYS. You can obviously change any of these parameters as long as your
choice makes sense.
This topology shows that repeaters interconnection is not limited to a line.
Nevertheless, the repeaters interconnections are limited to a tree structure.
However this does not limit data exchange, which can take place between any
two devices in the tree.
Product F (the last product in the tree) must be set to access point mode.
Theoretically, product F could be configured in repeater mode but the client
portion of the repeater would consume radio bandwidth trying to associate.
Product A Product B
Device Configuration Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode 802.11na
HT mode 20MHz HT mode 20MHz
Channel 36 Channel 36
Country code FR Country code FR
Interface Configuration 1 (Radio A) Interface Configuration 1 (Radio A)
Parameter Value Parameter Value
Role Client Role Client
Bridging mode 4 addresses format (WDS) Bridging mode 4 addresses format (WDS)
Mutiple ESSIDs on Mutiple ESSIDs on
Wireless Network SSID_ACKSYS Wireless Network SSID_ACKSYS
Nicknames Nicknames
ESSID Configuration (SSID_ACKSYS) ESSID Configuration (SSID_ACKSYS)
Parameter Value Parameter Value
WLAN description SSID_ACKSYS WLAN description SSID_ACKSYS
ESSID ACKSYS ESSID same as product A
Priority group 7 Priority group 7
BSSID Product B radio card MAC BSSID Product C radio card MAC
address address
Interface Configuration 2 (Radio A) Interface Configuration 2 (Radio A)
Parameter Value Parameter Value
Role Access point Role Access point
ESSID ACKSYS ESSID same as product A
Product C Product D
Device Configuration Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode 802.11na
HT mode 20MHz HT mode 20MHz
Channel 36 Channel 36
Country code FR Country code FR
Interface Configuration 1 (Radio A) Interface Configuration 1 (Radio A)
Parameter Value Parameter Value
Role Client Role Client
Bridging mode 4 addresses format (WDS) Bridging mode 4 addresses format (WDS)
Mutiple ESSIDs on Mutiple ESSIDs on
Wireless Network SSID_ACKSYS Wireless Network SSID_ACKSYS
Nicknames Nicknames
ESSID Configuration (SSID_ACKSYS) ESSID Configuration (SSID_ACKSYS)
Product E Product F
Device Configuration Device Configuration
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11na 802.11 mode 802.11na
HT mode 20MHz HT mode 20MHz
Channel 36 Channel 36
Country code FR Country code FR
Interface Configuration 1 (Radio A) Interface Configuration
Parameter Value Parameter Value
Role Client Role Access Point
Bridging mode 4 addresses format (WDS) ESSID same as product A
Mutiple ESSIDs on
Wireless Network SSID_ACKSYS
Nicknames
ESSID Configuration (SSID_ACKSYS)
Parameter Value
WLAN description SSID_ACKSYS
ESSID same as product A
Priority group 7
BSSID Product F radio card MAC
Interface Configuration 2 (Radio A)
Parameter Value
Role Access point
ESSID same as product A
Product G
Device Configuration
Parameter Value
Enable device on
802.11 mode 802.11na
HT mode 20MHz
Channel 36
Country code FR
Interface Configuration
Parameter Value
Role Client
Bridging mode 4 addresses format (WDS)
ESSID same as product A
Roaming
Parameter Value
Enable proactive roaming on
Channel same as product A
Current AP minimum -60
level
Delay between 2 5000
successive scan cycle
Only the configuration of product ‘A’ (the plant gateway) is given below.
Product ‘B’ and the operation server share a virtual LAN in the same IP range
(192.168.0.0/24), products ‘B’ being fed their address through DHCP in the
range 192.168.0.100… 192.168.0.249. The operation server should have an
address such as 192.168.0.1.
The ‘B’ products are given product ‘A’ as their default gateway, but this is not
useable for two reasons: (a) zones forwarding is not set in the configuration
below, and (b) the NAT in the phone operator network does not know how to
route back to individual ‘B’ products.
In the picture, the GRE endpoint is installed in the NAT gateway, but it could be
installed in some other device, provided the NAT has a forwarding rule to that
device.
The big picture looks like the previous one, but the cellular interface on
product ‘A’ must be set up as a NAT/PAT. Since access to the entire Internet is
granted, the GRE tunnel is left out:
Product A Products B
Device Configuration (WiFi) Device Configuration (WiFi)
Parameter Value Parameter Value
Enable device on Enable device on
802.11 mode 802.11ac+n 802.11 mode 802.11ac+n
HT mode 20 MHz HT mode 20 MHz
Channel 36 Channel 36
Country code FR Country code FR
Interface Configuration (WiFi) Interface Configuration (WiFi)
Parameter Value Parameter Value
Role Access point Role Client
ESSID MySsid ESSID MySsid
Network Configuration (LAN) Network Configuration (LAN)
Parameter Value Parameter Value
Enable interface on Enable interface on
IPv4 address 192.168.0.1 Protocol DHCP
IPv4 Netmask 255.255.255.0 Interfaces settings tab:
Network Configuration (Cellular) Bridge interfaces on Client
Parameter Value Interface Wifi, LAN 1, LAN 2
Enable interface on Corporate NAT gateway
Replace default route on Important note: the data center gateway may
Use peer DNS on require extra configuration, e.g. NAT/PAT
forwarding rules. It cannot be shown here
SIM1 (or SIM2) pin code Operator provided value since it depends on the gateway’s
Country code FR manufacturer and application specifics.
DHCP Service
Parameter Value
Ignore interface off
Firewall – public zone
Name Public
Enable NAT/PAT on
Default acceptance policy All disabled
Covered networks Cellular
Traffic forward As required by application
Firewall – private zone
Name Private
Enable NAT/PAT off
Default acceptance policy All enabled
Covered networks lan
Inter-zone forwarding Allow to “public”
‘B’ devices can only access the IP addresses allowed by the routing tables in
both the gateway product ‘A’ and the VPN server at the data center. The
gateway product ‘A’ is usually set to forward all traffic to the VPN server.
However it may include exceptions to allow access to specific Internet places
outside the VPN. The VPN server (at the data center) usually restricts
forwarding to a selected group of operation servers, forbidding the remote
device to access unauthorized computers and vice-versa.
Authentication mode
For the sake of clarity, the configuration below uses PSK authentication. A real
installation should use certificates. Certificates are more secure and allow the
server to accept several clients simultaneously. Also, they allow extra routing
configuration to be pushed from the server to its clients at connection time.
The PSK can be produced on a Linux computer with the following command:
openvpn --genkey --secret static.key
Corporate OpenVPN server configuration
Complete configuration depends on the corporate infrastructure. Only
guidelines can be given here.
If the subnet of the product doesn’t match the subnet of your computer, you can
change its IP address before upgrading from this page.
Then, find the firmware binary file on your disk, enter the admin password if needed,
and click Apply
If you want to upgrade several units (same model), you just need to make a multi-
selection in the main window:
While the product is in Emergency upgrade mode it still allows to restore factory
settings by pressing the reset button more than two seconds.
You can voluntarily enter Emergency Upgrade mode: press and hold the reset button
during product start-up, until the Diag led starts to blink
IX TROUBLESHOOTING
This section gives indications on the checks to perform when things do not
work as expected after configuration.
A network sniffer may prove very helpful when debugging network
connections. We recommend WireShark, a free sniffer working on Windows
and Linux.
Check IP addresses: the following assumes that all network devices are in the
same LAN (the computer used for the tests, the product, the remote device):
➢ All network devices must be in the same IP subnet (see RFC 950). For
example 192.168.1.253 and 192.168.1.10 are in the same subnet, but
192.168.1.253 and 128.1.1.10 are not (assuming a netmask of
255.255.255.0)
➢ All network devices must have the same netmask
➢ When changing the IP address of one device, the others keep the old
address for several minutes in the ARP cache: clear it with “arp –d”
(Windows O.S.) or by powering off the caching devices
➢ Windows (or other) firewalls may prevent communication.
➢ The web interface (in the Tools/Network menu) provides a “ping”
feature which executes the ping command in background and then
display the result on the web page. A traceroute tool is also available
on the same page.
Run software
Run the sender and the receiver software now.
1) Push the reset button steadily for at least 3 seconds, until the “Diag” LED
turns back red; this resets the product to factory settings. Wait until both
“Diag” and “C-Key” LEDs turn green.
X.5 Multicast
X.5.1 Multicast route is unstable in the Web interface?
After configuring a multicast group and starting the corresponding multicast sender,
you may experiment that the route comes and goes in the Web interface, page
Status/Network/Multicast routes list.
One frequent cause is that the router receives the multicast flow but ignores it
because no outgoing interface is configured.
Check the relevant interfaces in the “local networks configuration” section of the
Setup/Routing/Multicast routing page.
Check that the IGMP reports from the receiver include the expected multicast group
(see next FAQ below).
X.5.2 Receiver device does not send its multicast group in its IGMP reports?
In Linux devices, IGMP messages are sent only on the interface defined by the routing
table, which must include an appropriate routing entry such as
$ route –n
Destination Gateway Genmask Flags Metric Ref Use Iface
(…)
224.0.0.0 0.0.0.0 240.0.0.0 U 0 0 0 eth0
X.7.2 What is the roaming delay when the current access point disappears suddenly?
This can occur when a big obstacle suddenly gets in the way of the radio waves: for
example, turning around the corner of a tunnel. This can also happen if the AP is powered
off or fails for whatever reason. The client product has several ways to find out:
➢ If the client is sending data to the AP and the AP no longer acknowledges it, the client
will drop the association after 50 unacknowledged frames. Each frame is retried using
the relevant retry procedures and appropriate (configurable) supported rates.
➢ If the client does not send data, it will rely on the beacons received from the AP. The
client will detect when several consecutive beacons are missing; after which it will send
two extra control frames (each retried 10 times) to further probe the AP. If the AP still
does not respond, the client will drop the association. The number of missing beacons is
configurable.
The total duration of this procedure depends on the configured number, the beacon
interval duration set in the AP configuration, and the lowest configured basic rate (for
the probe involving the control frames)
- The AP is configured in such a way that it cannot initialize quickly because of ACS or DFS
delays,
In this case, at startup, the GRE tunnel searches for an outgoing route to the remote
endpoint but cannot find it because it does not exist yet. It reverts to some default route
potentially pointing in the wrong direction.
The solution is to either change the AP settings, or to include the AP network interface into
a bridge. A software bridge has no startup delay and the GRE tunnel will always find it.
If the FTP server is located in the public area, the FTP client will be configured in passive
mode, so that it is the source of the FTP DATA connection. (This is the default mode with
FileZilla)
If the server is located in a private zone, the FTP client must be configured in active mode,
so that it is the source of the FTP DATA connection. Here is how to configure FileZilla FTP
client in active mode:
- In the client settings section, FTP page, select the Active mode
- In the Active mode page, check the Limit local ports used by FileZilla box. You can leave
the default range if it is free, or define your own range.
- Check Use the following IP address and enter the public IP address of the router
Repeater A combined client+AP on the same radio, linked together in a software bridge.
Data received either by the AP or by the Ethernet LAN can be forwarded
through the client to a remote AP, allowing setting up a chain.
RP The Rendezvous Point is the multicast router responsible for distribution of a
given multicast group.
RTS/CTS An optional MAC protocol, that requires sending a small RTS frame that
reserves the air medium for a long enough duration to send the next data
frame. The receiver replies by sending a CTS frame that makes the same
reservation. Therefore, all wireless stations in radio range of both the
transmitter and the receiver, are informed of the data transmission that will
take place.
SSID Service Set Identifier, a string identifying the wireless network formed by a
group of APs and their clients.
SSM Source Specific Multicast is a variant of multicast routing where the receiver
knows the address of the sender, so that there is no need to go through the
RP.
USM User-based Security Model, a way to define SNMP access permissions on a
per-user basis.
VLAN Virtual LAN, a LAN tunneled in another LAN by adding a VLAN tag to each
frame in the VLAN.
Wi-Fi™ “Wireless Fidelity”. In this documentation, this term is used as a synonym for
802.11.
WLAN Wireless LAN, a group of Wi-Fi stations sharing a common network name (SSID
or Mesh ID), and a common authentication method, in order to exchange
information with each other.
Besides specifying the center frequency of each channel, 802.11 also specifies (in
Clause 17) a spectral mask defining the permitted distribution of power across each
channel. The mask requires that the signal be attenuated by at least 30 dB from its
peak energy at ± 11 MHz from the center frequency, so that the channels are
effectively 22 MHz wide. One consequence is that stations can only use every fifth
channel without overlap, typically 1, 6 and 11 in the Americas, 1-13 in Europe, etc.
Another is that channels 1-13 effectively require the band 2401-2483 MHz, the actual
allocations being for example 2400-2483.5 in the UK, 2402-2483.5 in the US, etc.
Since the spectral mask only defines power output restrictions up to ± 22 MHz from
the center frequency to be attenuated by 50 dB, it is often assumed that the energy of
the channel extends no further than these limits. It is more correct to say that, given
the separation between channels 1, 6, and 11, the signal on any channel should be
sufficiently attenuated to minimally interfere with a transmitter on any other channel.
Due to the near-far problem, a transmitter can impact a receiver on a “non-
overlapping” channel, but only if it is close to the victim receiver (within a meter) or
operating above allowed power levels.
Summary: