Home > Motorola > Wireless > Motorola Wing 5 Manual

Motorola Wing 5 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1128
    							FIREWALL LOGGING 25 - 15
    25.1.12 ICMP Destination log 
    The following example displays an ICMP destination as unreachable when no matching payload is found:
    July 28 19:57:09 2011: %DATAPLANE-5-ICMPPKTDROP: Dropping ICMP Packet from 192.168.1.104 to 192.168.2.102, with 
    ProtocolNumber:1 ICMP code 3 and ICMP type 3. Reason: no flow matching payload of ICMP Error.
    July 28 19:57:09 2011: %DATAPLANE-5-ICMPPKTDROP: Dropping ICMP Packet from 192.168.1.104 to 192.168.2.102, with 
    ProtocolNumber:1 ICMP code 3 and ICMP type 3. Reason: no flow matching payload of ICMP Error.
    To generate an ICMP protocol log, an ACL rule has to be applied and logging has to be enabled.
    For example, the following commands has to be executed:
    rfs7000-37FABE(config-ip-acl-test)#permit icmp any any log rule-precedence 20
    rfs7000-37FABE(config-ip-acl-test)# 
    						
    							25 - 16 WiNG CLI Reference Guide
    25.1.13 ICMP Packet log
    July 28 20:37:04 2011: %DATAPLANE-5-LOGRULEHIT: Matched ACL:ftpuser:ip Rule:0 Disposition:Drop Packet  Src 
    MAC: Dst MAC: Ethertype:0x0800 Src IP:192.168.1.99 Dst IP:192.168.1.1 
    Proto:1 ICMP Type:8 ICMP Code:0.
    July 28 20:37:08 2011: %DATAPLANE-5-ICMPPKTDROP: Dropping ICMP Packet from 192.168.2.1 to 172.16.31.196, with 
    Protocol Number:1 ICMP code 3 and ICMP type 3. Reason: no flow matching payload of ICMP Error.
    To generate an ICMP protocol log, an ACL rule has to be applied and logging has to be enabled:
    For example, the following commands has to be executed:
    rfs7000-37FABE(config-ip-acl-test)#permit icmp any any log rule-precedence 20
    rfs7000-37FABE(config-ip-acl-test)# 
    						
    							FIREWALL LOGGING 25 - 17
    25.1.14 SSH connection log
    A SSH connection is enabled on the wireless controller using factory settings. 
    Running primary software, version 5.0.0.0-81243X
    Alternate software secondary, version 5.2.0.0-048D
    Software fallback feature is enabled
    System bootup time (via /proc/uptime) was 126.10 92.38
    Please press Enter to activate this console. May 19 20:47:33 2010: %DOT11-5-COUNTRY_CODE: Country of operation 
    configured to in [India]
    July 28 20:47:34 2011: %DIAG-6-NEW_LED_STATE: LED state message AP_LEDS_ON from module DOT11
    July 28 20:47:34 2011: KERN: vlan1: add 01:00:5e:00:00:01 mcast address to master interface.
    July 28 20:47:34 2011: %NSM-4-IFUP: Interface vlan2 is up
    July 28 20:47:34 2011: KERN: vlan2: add 01:00:5e:00:00:01 mcast address to master interface.
    July 28 20:47:34 2011: %NSM-4-IFUP: Interface vlan172 is up
    July 28 20:47:34 2011: KERN: vlan172: add 01:00:5e:00:00:01 mcast address to master interface.
    July 28 20:47:34 2011: %DAEMON-3-ERR: dhcrelay: interface allocate: vlan1
    July 28 20:47:34 2011: %PM-6-PROCSTART: Starting process /usr/sbin/sshd
    July 28 20:47:34 2011: %DAEMON-3-ERR: dhcrelay: idataplane enabled
    nterface allocatCCB:21:Firewall enabled
    e : vlan1
    July 28 20:47:34 2011: %DAEMON-3-ERR: dhcrelay: interface allocate : vlan2
    July 28 20:47:34 2011: %KERN-4-WARNING: dataplane enabled.
    July 28 20:47:34 2011: %DATAPLANE-5-FWSTARTUP: Firewall enabled.
    July 28 20:47:39 2011: %DATAPLANE-5-LOGRULEHIT: Matched ACL:ftpuser:ip Rule:0 Disposition:Drop Packet  Src 
    MAC: Dst MAC: Ethertype:0x0800 Src IP:192.168.1.99 Dst IP:192.168.1.1 
    Proto:6 Src Port:3327 DstPort:22. 
    						
    							25 - 18 WiNG CLI Reference Guide
    25.1.15 Allowed/Dropped Packets Log
    The following example displays disposition information regarding allow/deny packets:
    Allow Packets
    CCB:0:Matched ACL:ftpuser:ip Rule:1 Disposition:Allow Packet  Src MAC: Dst MAC: Ethertype:0x0800 Src IP:192.168.2.102 Dst IP:192.168.2.1 Proto:17 Src Port:137 Dst Port:137
    CCB:0:Matched ACL:ftpuser:ip Rule:1 Disposition:Allow Packet  Src MAC: Dst MAC: Ethertype:0x0800 Src IP:192.168.2.102 Dst IP:192.168.2.1 Proto:17 Src Port:1029 Dst Port:53
    CCB:July 28 18:14:3220110: %DATAPLAN:-5-LOGRULEHIT: Matched ACL:ftpuer:aip Rule:1 Ditcposition:Allow hedacket  
    Src MAC: 00-11-25-14-D9-A2> Dst MAC: thertLype:0x0800:Src IP:192.168..102 Dsft IP:192t168.2.1 
    Proto:1p Src Port:137 Dut Port:137.
    ser:ip Rule:1 Disposition:Allow Packet  Src MAC: Dst MAC: Ethertype:0x0800 
    Src IP:192.168.2.102 Dst IP:192.168.2.1 Proto:17 Src Port:1029 Dst Port:53
    Drop/Deny Packets
    CCB:0:Matched ACL:ftpuser:ip Rule:0 Disposition:Drop Packet  Src MAC: Dst MAC: Ethertype:0x0800 Src IP:192.168.2.102 Dst IP:192.168.2.1 Proto:17 Src Port:137 Dst Port:137
    July 28 20:41:28 2011: %DATAPLANE-5-LOGRULEHIT: Matched ACL:ftpuser:ip Rule:0 Disposition:Drop Packet  Src 
    MAC: Dst MAC: Ethertype:0x0800 Src IP:192.168.2.102 Dst IP:192.168.2.1 
    Proto:17 Src Port:137 Dst
    To generate an allow/deny protocol log, an ACL rule has to be applied and logging has to be enabled.
    For example, the following commands has to be executed:
    rfs7000-37FABE(config-ip-acl-test)#permit ip any any log rule-precedence 20
    rfs7000-37FABE(config-ip-acl-test)#
    rfs7000-37FABE(config-ip-acl-test)#deny ip any any log rule-precedence 20
    rfs7000-37FABE(config-ip-acl-test)# 
    						
    							APPENDIX A CONTROLLER MANAGED 
    WLAN USE CASE
    This section describes the activities required to configure a controller managed WLAN. Instructions are provided using the 
    controller CLI.
     Creating a First Controller managed WLAN
    Assumptions
    Design
    Using the Command Line Interface to Configure the WLAN 
    						
    							A - 2 WiNG CLI Reference Guide
    A.1 Creating a First Controller Managed WLAN
    It is assumed you have a RFS4000 wireless controller with the latest build available from Motorola Solutions. It is also 
    assumed you have one AP7131 model access point and one AP650 model access point, both with the latest firmware 
    available from Motorola Solutions.
    Upon completion, you will have created a WLAN on a RFS4000 model wireless controller using a DHCP server to allocate 
    IP addresses to associated wireless clients.
    A.1.1 Assumptions
    Creating a First Controller Managed WLAN
    Verify the following conditions have been satisfied before attempting the WLAN configuration activities described in this 
    section:
    1. It is assumed the wireless controller has the latest firmware version available from Motorola Solutions.
    2. It is assumed the AP7131 and AP650 access points also have the latest firmware version available from Motorola 
    Solutions.
    3. It is assumed there are no previous configurations on the wireless controller or access point and default factory 
    configurations are running on the devices.
    4. It is assumed you have administrative access to the wireless controller and access point CLI.
    5. It is assumed the individual administrating the network is a professional network installer. 
    A.1.2 Design
    Creating a First Controller Managed WLAN
    This section defines the network design being implemented.
    Figure A-1Network Design
    This is a simple deployment scenario, with the access points connected directly to the wireless controller. One wireless 
    controller port is connected to an external network.
    On the RFS4000 wireless controller, the GE1 interface is connected to an external network. Interfaces GE3 and GE4 are 
    used by the access points. 
    						
    							A - 3
    On the external network, the controller is assigned an IP address of 192.168.10.188. The wireless controller acts as a DHCP 
    server for the wireless clients connecting to it, and assigns IP addresses in the range of 172.16.11.11 to 172.16.11.200. 
    The rest of IPs in the range are reserved for devices requiring static IP addresses.
    A.1.3 Using the Command Line Interface to Configure the WLAN
    Creating a First Controller Managed WLAN
    These instructions are for configuring your first WLAN using the controller CLI. 
    Use a serial console cable when connecting to the wireless controller for the first time. Set the following configuration 
    when using the serial connection:
     Bits per second: 19200
     Data Bit: 8
     Parity: None
     Stop Bit: 1
     Flow Control: None
    The steps involved in creating a WLAN on a wireless controller are:
    1.Logging Into the Controller for the First Time
    2.Creating a RF Domain
    3.Creating a Wireless Controller Profile
    4.Creating an AP Profile
    5.Creating a DHCP Server Policy
    A.1.3.1 Logging Into the Controller for the First Time
    Using the Command Line Interface to Configure the WLAN
    When powering on the wireless controller for the first time, you are prompted to replace the existing administrative 
    password. The credentials for logging into the wireless controller for the first time are:
    admin
     Password: motorola
    Ensure the new password created is strong enough to provide adequate security for the controller managed network.
    A.1.3.2 Creating a RF Domain
    Using the Command Line Interface to Configure the WLAN
    A RF Domain is a collection of configuration settings specific to devices located at the same physical deployment, such as 
    a building or a floor. Create a RF Domain and assign the country code where the devices are deployed. This is a mandatory 
    step, and the devices will not function as intended if this step is omitted.
    The instructions in this section must be performed from the Global Configuration mode of the wireless controller. To 
    navigate to this mode:
    RFS4000>enable
    RFS4000#
    RFS4000#configure terminal
    Enter configuration commands, one per line.  End with CNTL/Z.
    RFS4000(config)#
    Create the RF Domain using the following commands: 
    						
    							A - 4 WiNG CLI Reference Guide
    RFS4000(config)#rf-domain RFDOMAIN_UseCase1
    RFS4000(config-rf-domain-RFDOMAIN_UseCase1)#
    This command creates a profile with the name RFDOMAIN_UseCase1.
    Set the country code for the RF Domain.
    RFS4000(config-rf-domain-RFDOMAIN_UseCase1)#country-code us
    This sets the country code for this RF Domain. Save this change and exit the RF Domain profile context.
    RFS4000(config-rf-domain-RFDOMAIN_UseCase1)#commit write
    RFS4000(config-rf-domain-RFDOMAIN_UseCase1)#exit
    RFS4000(config)#
    To define the wireless controller’s physical location, use the same RF Domain configuration.
    RFS4000(config)#self
    RFS4000(config-device-03-14-28-57-14-28)#
    RFS4000(config-device-03-14-28-57-14-28)#use rf-domain RFDOMAIN_UseCase1
    Commit the changes and write to the running configuration. Exit this context.
    RFS4000(config-device-03-14-28-57-14-28)#commit write
    RFS4000(config-device-03-14-28-57-14-28)#exit
    RFS4000(config)#
    A.1.3.3 Creating a Wireless Controller Profile
    Using the Command Line Interface to Configure the WLAN
    The first step in creating a WLAN is to configure a profile defining the parameters applied to a wireless controller. 
    To create a profile:
    RFS4000(config)#profile rfs4000 RFS4000_UseCase1
    RFS4000(config-profile-RFS4000_UseCase1)#
    This creates a profile with the name RFS4000_UseCase1 and moves the cursor into its context. Any configuration made 
    under this profile is available when it’s applied to a device.
    Configure a VLAN
    Create the VLAN to use with the WLAN configuration. This can be done using the following commands:
    RFS4000(config-profile-RFS4000_UseCase1)#interface vlan 2
    RFS4000(config-profile-RFS4000_UseCase1-if-vlan2)#ip address 172.16.11.1/24
    The above command assigns the IP address 172.16.11.1 with the mask of 255.255.255.0 to VLAN2. Exit the VLAN2 context.
    RFS4000(config-profile-RFS4000_UseCase1-if-vlan2)#exit
    RFS4000(config-profile-RFS4000_UseCase1)#
    The next step is to assign this newly created VLAN to a physical interface. In this case, VLAN 2 is mapped to GE3 and GE4 
    to support two access points, an AP650 and an AP7131. The AP650 is connected to the gigabit interface GE3 and the 
    AP7131 to the GE4 interface.
    RFS4000(config-profile-RFS4000_UseCase1)#interface ge 3
    RFS4000(config-profile-RFS4000_UseCase1-if-ge3)#
    Map VLAN 1 to this interface. This assigns the IP address to the selected physical interface.
    RFS4000(config-profile-RFS4000_UseCase1-if-ge3)#switchport access vlan 2
    RFS4000(config-profile-RFS4000_UseCase1-if-ge3)#exit
    RFS4000(config-profile-RFS4000_UseCase1)#
    Similarly, map the defined VLAN 1 to the GE4 interface. 
    						
    							A - 5
    RFS4000(config-profile-RFS4000_UseCase1)#interface ge 4
    RFS4000(config-profile-RFS4000_UseCase1-if-ge4)#switchport access vlan 2
    RFS4000(config-profile-RFS4000_UseCase1-if-ge4)#exit
    RFS4000(config-profile-RFS4000_UseCase1)#
    Exit the profile and save it.
    RFS4000(config-profile-RFS4000_UseCase1)#exit
    RFS4000(config)#commit write
    Configure the Wireless Controller to use the Profile
    Before the wireless controller can be further configured, the profile must be applied to the wireless controller. 
    RFS4000(config)#self
    RFS4000(config-device-03-14-28-57-14-28)#
    RFS4000(config-device-03-14-28-57-14-28)#use profile RFS4000_UseCase1
    RFS4000(config-device-03-14-28-57-14-28)#exit
    RFS4000(config)#commit write
    Create a WLAN
    Use the following commands to create a WLAN:
    RFS4000(config)#wlan 1
    RFS4000(config-wlan-1)#
    Configure the SSID for the WLAN. This is the value that identifies and helps differentiate this WLAN.
    RFS4000(config-wlan-1)#ssid WLAN_USECASE_01
    Enable the SSID to be broadcast so wireless clients can find it and associate.
    RFS4000(config-wlan-1)#broadcast-ssid
    Associate the VLAN to the WLAN and exit.
    RFS4000(config-wlan-1)#vlan 2
    RFS4000(config-wlan-1)#exit
    Commit the Changes
    Once these changes have been made, they have to be committed before proceeding.
    RFS4000(config)#commit write
    A.1.3.4 Creating an AP Profile
    Using the Command Line Interface to Configure the WLAN
    An AP profile provides a method of applying common settings to access points of the same model. The profile significantly 
    reduces the time required to configure access points within a large deployment. For more information, see:
    Creating an AP650 Profile
    Creating an AP7131 Profile
    A.1.3.4.1 Creating an AP650 Profile
    Creating an AP Profile
    An AP650’s firmware is updated directly by its associated wireless controller. The process is automatic, and no 
    intervention is required. To create a profile for use with an AP650:
    RFS4000(config)#profile ap650 AP650_UseCase1
    RFS4000(config-profile-AP650_UseCase1)#
    Assign the access point to be a member of the same VLAN defined in Creating an AP Profile on page A-5. In this section, 
    the VLAN was defined as VLAN 2. Configure the access point to be a member of VLAN 2. 
    						
    							A - 6 WiNG CLI Reference Guide
    RFS4000(config-profile-AP650_UseCase1)#interface vlan 2
    RFS4000(config-profile-AP650_UseCase1-if-vlan2)#
    Configure this VLAN to use DHCP, so any device that is associated using this access point is automatically assigned a 
    unique IP address. Once completed, exit this context.
    RFS4000(config-profile-AP650_UseCase1-if-vlan2)#ip address dhcp
    RFS4000(config-profile-AP650_UseCase1-if-vlan2)#exit
    The VLAN has to be mapped to a physical interface on the access point. Since the only available physical interface on the 
    AP650 is GE1, this VLAN is mapped to it.
    RFS4000(config-profile-AP650_UseCase1)#interface ge 1
    RFS4000(config-profile-AP650_UseCase1-if-ge1)#switchport access vlan 2
    RFS4000(config-profile-AP650_UseCase1-if-ge1)#exit
    Before a WLAN can be implemented, it has to be mapped to a radio on the access point. An AP650 has 2 radios, in this 
    scenario, both radios are utilized.
    RFS4000(config-profile-AP650_UseCase1)#interface radio 1
    RFS4000(config-profile-AP650_UseCase1-if-radio1)#wlan 1
    RFS4000(config-profile-AP650_UseCase1-if-radio1)#exit
    RFS4000(config-profile-AP650_UseCase1)#interface radio 2
    RFS4000(config-profile-AP650_UseCase1-if-radio2)#wlan 1
    RFS4000(config-profile-AP650_UseCase1-if-radio2)#exit
    RFS4000(config-profile-AP650_UseCase1)#
    Commit the changes made to this profile and exit.
    RFS4000(config-profile-AP650_UseCase1)#commit write
    RFS4000(config-profile-AP650_UseCase1)#exit
    RFS4000(config)#
    Apply this Profile to the Discovered AP650
    Access the discovered access point using the following command. The discovered device’s MAC address is used to access 
    its context.
    RFS4000(config)#ap650 00-A0-F8-00-00-01
    RFS4000(config-device-00-A0-F8-00-00-01)#
    Assign the AP profile to this AP650 access point.
    RFS4000(config-device-00-A0-F8-00-00-01)#use profile AP650_UseCase1
    RFS4000(config-device-00-A0-F8-00-00-01)#commit write
    Apply the RF Domain profile to the AP
    Apply the previously created RF Domain to enable a country code to be assigned to the discovered access point. A 
    discovered access point only works properly if its country code is the country code of its associated wireless controller.
    RFS4000(config-device-00-A0-F8-00-00-01)#use rf-domain RFDOMAIN_UseCase1
    RFS4000(config-device-00-A0-F8-00-00-01)#commit write
    RFS4000(config-device-00-A0-F8-00-00-01)#exit
    RFS4000(config)#
    A.1.3.4.2 Creating an AP7131 Profile
    Creating an AP Profile
    To create a profile for use with an AP7131:
    RFS4000(config)#profile ap7131 AP7131_UseCase1
    RFS4000(config-profile-AP7131_UseCase1)#
    Set the access point to be a member of the same VLAN defined in Creating an AP Profile on page A-5. In this section, the 
    VLAN was defined as VLAN 2. Configure the access point to be a member of the VLAN 2. 
    						
    All Motorola manuals Comments (0)