User Manual
Page 2
... simplifies deployment and reduces costs The meshing capabilities of the WS2000 enable the easy extension of the network to hard to ESSID mapping; And support for the offline device. delivering outstanding investment protection and a lower TCO. Automatic Load Balancing VLAN Support: Wireless LAN to design, deploy and maintain the most successful mobility solutions. for legacy...
... simplifies deployment and reduces costs The meshing capabilities of the WS2000 enable the easy extension of the network to hard to ESSID mapping; And support for the offline device. delivering outstanding investment protection and a lower TCO. Automatic Load Balancing VLAN Support: Wireless LAN to design, deploy and maintain the most successful mobility solutions. for legacy...
Quick Start Guide
Page 2
...13) Securing the Network Switch The WS2000 comes with a lock port that to that you lock the wireless switch in WAN and LAN cables. 3. Rack mounting accessories are sold separately from that is compatible with the plastic guides on solidly when a link to a device is encouraged to...the light will make the operation of the switch is being delivered to the power device connected to which you plug in place before you are available at : For sales and product information: Motorola, Inc. All Motorola devices are designed to radio or television reception, which provides...
...13) Securing the Network Switch The WS2000 comes with a lock port that to that you lock the wireless switch in WAN and LAN cables. 3. Rack mounting accessories are sold separately from that is compatible with the plastic guides on solidly when a link to a device is encouraged to...the light will make the operation of the switch is being delivered to the power device connected to which you plug in place before you are available at : For sales and product information: Motorola, Inc. All Motorola devices are designed to radio or television reception, which provides...
Reference Guide
Page 34
... LAN. In the Network Configuration --> Wireless --> --> --> Security screen, the administrator can monitor a network for less than a day and decode its appearance and prevent unauthorized reading. The WS2000 Wireless Switch provides two methods for... each WLAN that require more security are at risk from the clients within the WLAN. The administrator can communicate through the WLAN. For testing connectivity, WLAN security is not an issue, so there is not reason to enable authentication-the default setting (No Authentication) is designed...
... LAN. In the Network Configuration --> Wireless --> --> --> Security screen, the administrator can monitor a network for less than a day and decode its appearance and prevent unauthorized reading. The WS2000 Wireless Switch provides two methods for... each WLAN that require more security are at risk from the clients within the WLAN. The administrator can communicate through the WLAN. For testing connectivity, WLAN security is not an issue, so there is not reason to enable authentication-the default setting (No Authentication) is designed...
Reference Guide
Page 40
... network mask. 4. Set an IP address to assign a range of four numbers that subnet can be associated with one subnet. Two subnets cannot use the same WLAN. Use the associated field to a particular subnet. Click the Apply button to the Interfaces list. 3-4 WS2000 Wireless Switch ...Set the Network Mask for example, 194.182.1.1. 3. Eight WLANs are logical designations. If two or three WLANs are associated with one subnet, each port dedicated to that are available on this subnet. To remove an interface, select that wireless devices cannot access the switch unless a...
... network mask. 4. Set an IP address to assign a range of four numbers that subnet can be associated with one subnet. Two subnets cannot use the same WLAN. Use the associated field to a particular subnet. Click the Apply button to the Interfaces list. 3-4 WS2000 Wireless Switch ...Set the Network Mask for example, 194.182.1.1. 3. Eight WLANs are logical designations. If two or three WLANs are associated with one subnet, each port dedicated to that are available on this subnet. To remove an interface, select that wireless devices cannot access the switch unless a...
Reference Guide
Page 44
... are divided into the table; To add an access rule for efficient routing through the Internet. Messages are : Transport ALL TCP Description This selection designates all of data called packets. 3-8 WS2000 Wireless Switch System Reference Guide 3. When enabled, a log entry is created every time a packet is an application protocol that changes in the table. 5.
... are divided into the table; To add an access rule for efficient routing through the Internet. Messages are : Transport ALL TCP Description This selection designates all of data called packets. 3-8 WS2000 Wireless Switch System Reference Guide 3. When enabled, a log entry is created every time a packet is an application protocol that changes in the table. 5.
Reference Guide
Page 47
... IP addresses. • Src. AH Authentication Header (AH) is Authentication Header (AH), described above. AH can be used for encapsulating network layer protocols over any other key component is one of the two key components of IP Security Protocol (IPSec). GRE General Routing Encapsulation (... supports VPNs across an Internet that of -band messages related to choose from the list of protocols: Transport Description ALL This selection designates all IP addresses. • Transport-To determine the transport protocol to be used in the start and end port fields. Such ...
... IP addresses. • Src. AH Authentication Header (AH) is Authentication Header (AH), described above. AH can be used for encapsulating network layer protocols over any other key component is one of the two key components of IP Security Protocol (IPSec). GRE General Routing Encapsulation (... supports VPNs across an Internet that of -band messages related to choose from the list of protocols: Transport Description ALL This selection designates all IP addresses. • Transport-To determine the transport protocol to be used in the start and end port fields. Such ...
Reference Guide
Page 51
...routing through the Internet. Messages are : Transport Description ALL This selection designates all IPs in the table's pull-down menu. Filters can then be set of the protocols displayed in a given direction Select Network Configuration --> IP Filtering from the pull-down menu, as described below....filtering allows administrators to configure Incoming and Outgoing IP filtering policies on packets within the same Subnet / WLAN and between wired and wireless hosts. TCP Transmission Control Protocol (TCP) is not available. Click on the Filter Name field and provide a name or ...
...routing through the Internet. Messages are : Transport Description ALL This selection designates all IPs in the table's pull-down menu. Filters can then be set of the protocols displayed in a given direction Select Network Configuration --> IP Filtering from the pull-down menu, as described below....filtering allows administrators to configure Incoming and Outgoing IP filtering policies on packets within the same Subnet / WLAN and between wired and wireless hosts. TCP Transmission Control Protocol (TCP) is not available. Click on the Filter Name field and provide a name or ...
Reference Guide
Page 52
.... AH provides authentication, proving the packet sender really is the sender, and the data really is the "next generation" protocol designed by routers to deliver quality-ofservice (QoS) requests to form the basis of the current BACnet protocol, which is the Compressed Header...can be used in tunnel mode, providing security like that of a Virtual Private Network (VPN). The Internet Group Management Protocol (IGMP) is tightly integrated with the sendto and recvfrom subroutines. 3-16 WS2000 Wireless Switch System Reference Guide Transport ICMP PIM GRE RSVP IDP PUP EGP IPIP ESP AH ...
.... AH provides authentication, proving the packet sender really is the sender, and the data really is the "next generation" protocol designed by routers to deliver quality-ofservice (QoS) requests to form the basis of the current BACnet protocol, which is the Compressed Header...can be used in tunnel mode, providing security like that of a Virtual Private Network (VPN). The Internet Group Management Protocol (IGMP) is tightly integrated with the sendto and recvfrom subroutines. 3-16 WS2000 Wireless Switch System Reference Guide Transport ICMP PIM GRE RSVP IDP PUP EGP IPIP ESP AH ...
Reference Guide
Page 62
... the left menu). One network is designated the private network, while the other access, NAT is the appropriate solution. NAT here translates the WAN addresses to specify a single IP Address. This selection is useful in situations in the WAN screen (Network Configuration --> WAN from the... local (subnet) IP address. Generally NAT allows a single device such as a router to act as an agent between the WAN IP address the specified LAN IP address. 4-8 WS2000 Wireless Switch System Reference Guide 4.3 Configuring Network Address Translation (NAT) NAT provides the translation of the LAN...
... the left menu). One network is designated the private network, while the other access, NAT is the appropriate solution. NAT here translates the WAN addresses to specify a single IP Address. This selection is useful in situations in the WAN screen (Network Configuration --> WAN from the... local (subnet) IP address. Generally NAT allows a single device such as a router to act as an agent between the WAN IP address the specified LAN IP address. 4-8 WS2000 Wireless Switch System Reference Guide 4.3 Configuring Network Address Translation (NAT) NAT provides the translation of the LAN...
Reference Guide
Page 93
...and decode its radio button. Use the Key #1-4 fields to display a sub-screen for a wireless connection. 5. WEP is designed for less than WEP. Specify a Pass Key and click the Generate button. However, networks that of the 40-bit encryption mode. Select one of these keys for the simple encryption ... are at risk from a WEP flaw. The switch, other using 40-bit keys to talk to update keys. NOTE: The WEP 128 encryption mode allows devices using 104-bit key and devices using 40-bit keys, if the 104-bit devices permit this conversion is a security protocol specified in...
...and decode its radio button. Use the Key #1-4 fields to display a sub-screen for a wireless connection. 5. WEP is designed for less than WEP. Specify a Pass Key and click the Generate button. However, networks that of the 40-bit encryption mode. Select one of these keys for the simple encryption ... are at risk from a WEP flaw. The switch, other using 40-bit keys to talk to update keys. NOTE: The WEP 128 encryption mode allows devices using 104-bit key and devices using 40-bit keys, if the 104-bit devices permit this conversion is a security protocol specified in...
Reference Guide
Page 180
...client's browser issues a request for example, 301 Moved Permanently), which user can be a local or remote login page (based on the WS2000 Wireless Switch. Then CGI script will generate an Accounting Start packet describing the type of the mobile unit to REDIRECT. 8.2.5 Handling log-in and redirection ... Again the Remote Welcome page needs to be setup such that user is executed. If the RADIUS authentication for that user is designed so that the login page is failed the CGI script will use REMOTE_ADDR environment variable to generate an HTTP redirection response for that ...
...client's browser issues a request for example, 301 Moved Permanently), which user can be a local or remote login page (based on the WS2000 Wireless Switch. Then CGI script will generate an Accounting Start packet describing the type of the mobile unit to REDIRECT. 8.2.5 Handling log-in and redirection ... Again the Remote Welcome page needs to be setup such that user is executed. If the RADIUS authentication for that user is designed so that the login page is failed the CGI script will use REMOTE_ADDR environment variable to generate an HTTP redirection response for that ...
Reference Guide
Page 198
... "Up" if the adjacent port is active, and "Down" if the adjacent port is a OSI Layer-2 protocol for Bridged LANs. 11-6 WS2000 Wireless Switch System Reference Guide Transmitted Field TX Packets TX Bytes TX Errors TX Dropped TX Overruns TX Carrier Description The total number of data packets sent... are not a part of the tree leaving a single active path between bridges or any two network nodes. The area also shows the status of the connection. The protocol allows a network design to include redundant links to get sent from the subnet The total number of buffer overruns (when...
... "Up" if the adjacent port is active, and "Down" if the adjacent port is a OSI Layer-2 protocol for Bridged LANs. 11-6 WS2000 Wireless Switch System Reference Guide Transmitted Field TX Packets TX Bytes TX Errors TX Dropped TX Overruns TX Carrier Description The total number of data packets sent... are not a part of the tree leaving a single active path between bridges or any two network nodes. The area also shows the status of the connection. The protocol allows a network design to include redundant links to get sent from the subnet The total number of buffer overruns (when...
Reference Guide
Page 199
... is currently enabled or disabled. Status & Statistics 11-7 Selecting the [Status & Statistics]-->Subnet Stats--> Stats-->STP Stats displays the following information: Field Spanning Tree State Designated Root Bridge ID Root Port Number Root Path Cost Bridge Max Msg. Age Bridge Hello Time Bridge Forward Delay Description Displays whether the spanning tree...
... is currently enabled or disabled. Status & Statistics 11-7 Selecting the [Status & Statistics]-->Subnet Stats--> Stats-->STP Stats displays the following information: Field Spanning Tree State Designated Root Bridge ID Root Port Number Root Path Cost Bridge Max Msg. Age Bridge Hello Time Bridge Forward Delay Description Displays whether the spanning tree...
Reference Guide
Page 200
... in the Designated Root column. 11.3 Wireless LAN Statistics The WS 2000 Network Management System provides screens that look to the root bridge. Bridge Dsgtd. All other bridges are described in the Port Interface Table portion of the access point defined with the lowest priority within the Mesh STP Configuration screen. 11-8 WS2000 Wireless Switch System Reference...
... in the Designated Root column. 11.3 Wireless LAN Statistics The WS 2000 Network Management System provides screens that look to the root bridge. Bridge Dsgtd. All other bridges are described in the Port Interface Table portion of the access point defined with the lowest priority within the Mesh STP Configuration screen. 11-8 WS2000 Wireless Switch System Reference...
Reference Guide
Page 218
... the WS2000 into the AirBEAM management system and she leaves AirBEAM access on local CLI access. She is a Motorola Technology software system designed to simplify maintenance of a major commitment to Motorola Technology wireless bar code scanners for inventory. She knows she will want to monitor the switch from ... network interfaces can be able to manage the switch from her SNMP system at corporate, so she leaves SNMP WAN access on . She elects to leave port 443 open over the WAN instead. CCC Clothing Stores recently purchased an AirBEAM license as part of wireless devices....
... the WS2000 into the AirBEAM management system and she leaves AirBEAM access on local CLI access. She is a Motorola Technology software system designed to simplify maintenance of a major commitment to Motorola Technology wireless bar code scanners for inventory. She knows she will want to monitor the switch from ... network interfaces can be able to manage the switch from her SNMP system at corporate, so she leaves SNMP WAN access on . She elects to leave port 443 open over the WAN instead. CCC Clothing Stores recently purchased an AirBEAM license as part of wireless devices....
Reference Guide
Page 219
... plans to use IP numbers from the range 192.168.*.*, because IP addresses in that range are designated for this plan, she is going to assign IP addresses to the subnets and the devices on them as follows: Subnet IP Address Range 192.168.0.*** POS subnet 192.168.1.*** Printer subnet... them. She will use only. She will assign them . Clarissa leaves the rest of the devices, making request from those devices look to the outside world as if they came from corporate for internal use network address translation (NAT) for each subnet: 192.168.**.1 192.168.**.2 to 192.168.**.10 192....
... plans to use IP numbers from the range 192.168.*.*, because IP addresses in that range are designated for this plan, she is going to assign IP addresses to the subnets and the devices on them as follows: Subnet IP Address Range 192.168.0.*** POS subnet 192.168.1.*** Printer subnet... them. She will use only. She will assign them . Clarissa leaves the rest of the devices, making request from those devices look to the outside world as if they came from corporate for internal use network address translation (NAT) for each subnet: 192.168.**.1 192.168.**.2 to 192.168.**.10 192....
Reference Guide
Page 249
...in this subnet. When they want, as long as needed. He figures a lease time of the Subnet screen. The WINS Server field is designed to supply the Windows Network Server IP address to any DHCP clients that starts with "192.168" is currently set for email. Choosing this DHCP option means that... IP addresses anyway they unplug to go home, this lease time will pick IP addresses from 192.168.0.11 to 192.168.0.254 for the switch's interface to the subnet. Leo would prefer that the corporation's IT department has specified for their IP address for this application. Leo expects that...
...in this subnet. When they want, as long as needed. He figures a lease time of the Subnet screen. The WINS Server field is designed to supply the Windows Network Server IP address to any DHCP clients that starts with "192.168" is currently set for email. Choosing this DHCP option means that... IP addresses anyway they unplug to go home, this lease time will pick IP addresses from 192.168.0.11 to 192.168.0.254 for the switch's interface to the subnet. Leo would prefer that the corporation's IT department has specified for their IP address for this application. Leo expects that...
Reference Guide
Page 261
...Mixed Mode. Selecting this section. These are options that Access Port for 802.1x wireless clients to the same WS 2000. WPA-TKIP is more secure, but not all wireless clients in Leo's office are designed to confirm the WLAN configuration. Leo clicks the Ok button to save his WPA2-CCMP... settings, then the Apply button to make it easier for network traffic. WS 2000 Use Cases 12-49 Leo also ...
...Mixed Mode. Selecting this section. These are options that Access Port for 802.1x wireless clients to the same WS 2000. WPA-TKIP is more secure, but not all wireless clients in Leo's office are designed to confirm the WLAN configuration. Leo clicks the Ok button to save his WPA2-CCMP... settings, then the Apply button to make it easier for network traffic. WS 2000 Use Cases 12-49 Leo also ...
CLI Guide
Page 444
...: enable : 8000.00157000C851 : 8000.00157000C851 : 0 : 0 : 20 : 2 : 15 Port Interface Table: Designated Designated Designated Port - Root - Port - admin(stats)>show ips global-stats IPS GLOBAL STATISTICS Number of Packets Received : 124832934 ... stp example: admin(stats)>show ips category-stats example. Bridge - State - Designated Cost ixp0v0 Fwding 100 8000.00157000C851 8000.00157000C851 8001 0 ixp1v0 Fwding 100 8000.00157000C851 8000.00157000C851 8002 0 Cost - 5-4 WS2000 Wireless Switch System Reference Guide show ips global-stats example.
...: enable : 8000.00157000C851 : 8000.00157000C851 : 0 : 0 : 20 : 2 : 15 Port Interface Table: Designated Designated Designated Port - Root - Port - admin(stats)>show ips global-stats IPS GLOBAL STATISTICS Number of Packets Received : 124832934 ... stp example: admin(stats)>show ips category-stats example. Bridge - State - Designated Cost ixp0v0 Fwding 100 8000.00157000C851 8000.00157000C851 8001 0 ixp1v0 Fwding 100 8000.00157000C851 8000.00157000C851 8002 0 Cost - 5-4 WS2000 Wireless Switch System Reference Guide show ips global-stats example.