interoperability report ascom i62 ruckus wireless, zf7962 ... › ascompartnerweb › global ›...
TRANSCRIPT
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 1 2014-12-02
INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, ZF7962, 7363, 7341, 7343, 7372, 7982 and R300 access points i62 and OEM derivatives version 5.1.30
Ruckus wireless version 9.7.1.0.17
Ascom, Gothenburg
July 2014
[ ]
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 2 2014-12-02
TABLE OF CONTENT: INTRODUCTION ........................................................................................................................... 3
About Ascom ............................................................................................................................ 3 About Ruckus Wireless ............................................................................................................. 3
SITE INFORMATION .................................................................................................................... 4 SUMMARY .................................................................................................................................... 5
Known issues ............................................................................................................................ 6 Compatibility information .......................................................................................................... 6 General conclusion ................................................................................................................... 6
TEST RESULTS ............................................................................................................................ 7 Ascom WLAN Infrastructure Verification – VoWiFi ................................................................... 7
APPENDIX A: TEST CONFIGURATIONS .................................................................................... 8 Ruckus Wireless ZD 3000 version 9.7.1.0.17 ........................................................................... 8
Security settings (802.1X / PEAP-MSCHAPv2) .................................................................. 10 General settings (QoS, Radio) ............................................................................................ 14 CLI commands .................................................................................................................... 16
Innovaphone IP6000 (IP PBX) ................................................................................................ 19 APPENDIX B: DETAILED TEST RECORDS .............................................................................. 20
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 3 2014-12-02
INTRODUCTION This document describes necessary steps and guidelines to optimally configure Ruckus wireless platform with Ascom i62 VoWiFi handsets.
The guide should be used in conjunction with both Ruckus and Ascoms configuration guide(s).
About Ascom Ascom Wireless Solutions (www.ascom.com/ws) is a leading provider of on-site wireless communications for key segments such as hospitals, elderly care, independent living, manufacturing industries, secure establishments,retail and hotels. More than 75,000 systems are installed at major companies all over the world. The company offers a broad range of voice and professional messaging solutions, creating value for customers by supporting and optimizing their Mission-Critical processes. The solutions are based on VoWiFi, IP-DECT, nurse call and paging technologies, smartly integrated into existing enterprise systems. The company has subsidiaries in 11 countries and 1,200 employees worldwide. Founded in 1955 and based in Göteborg, Sweden, Ascom Wireless Solutions is part of the Ascom Group, listed on the Swiss Stock Exchange.
About Ruckus Wireless The Ruckus ZoneFlex system is a centrally managed WLAN system comprising of controllers and a variety of 802.11 a/b/g/n APs. There are two unique features in the ZoneFlex product that enhance voice communications. One is BeamFlex, our smart beamforming antennas, and the second is SmartCast, our traffic management engine. Combining a compact internal antenna array with expert control software, BeamFlex continuously ranks the antenna configurations for each receiving device and reconfigures itself in real-time to bypass interference and physical barriers. SmartCast provides automatic flow classification, software pre-queuing per station and per packet scheduling of traffic over the smart antenna array. It applies heuristics to automatically classify voice packets and place them in the right queue.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 4 2014-12-02
SITE INFORMATION
Test Site: Ascom US 300 Perimeter park drive Morrisville, NC, US-27560 USA Participants: Karl-Magnus Olsson, Ascom HQ, Gothenburg Sweden TEST TOPOLOGY
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 5 2014-12-02
SUMMARY Please refer to Appendix B for detailed results. WLAN Controller Features
High Level Functionality Result Association, Open with No Encryption OK Association, WPA-PSK, TKIP OK Association, WPA2-PSK, TKIP / AES Encryption OK Association, PEAP-MSCHAPv2 Auth., TKIP Encryption OK Association, PEAP-MSCHAPv2 Auth., AES Encryption OK Association, Multiple ESSIDs OK Beacon Interval and DTIM Period OK Preauthentication Not supported by controller PMKSA Caching OK WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK Active Mode (load test) OK 802.11 Power-save mode OK 802.11e U-APSD OK 802.11e U-APSD (load test) OK Roaming
High Level Functionality Result Roaming, Open with No Encryption OK Roaming, WPA-PSK, TKIP Encryption OK (Typical roaming time 218ms)*
Roaming, WPA2-PSK, AES Encryption OK (Typical roaming time 245ms)* Roaming, PEAP-MSCHAPv2 Auth, AES Encryption OK (Typical roaming time 34ms)* /** *) Average roaming times are measured using 802.11bgn on ZF7982. Refer to Appendix B for detailed test results * *) Measured times is with opportunistic/proactive Key Caching enabled (default enabled)
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 6 2014-12-02
Known issues
- Note that the “qtime” settings described in the “CLI settings” section is necessary for optimal battery life. Refer to Ascom ticket 20409
For additional information regarding the known issues please contact [email protected] or [email protected]
Compatibility information A full test round was performed on ZF7982 and ZF7372 while a less extensive test was performed on the already known access points ZF 7962 and ZF 7363. All test were done with a ZD3000 controller. We ensure compatibility/interoperability with all the access points and controllers listed below given that they run the software tested. i62 version 5.1.30 is using WLAN driver version 3.5.f. Supported access ports with Ruckus Wireless version 9.7.1.0.17: ZoneFlex 7962 ZoneFlex 7363 ZoneFlex 7341/7343 (Single radio versions of 7363) ZoneFlex 7372 ZoneFlex 7982 ZoneFlex R300 Supported controller platforms with Ruckus Wireless version 9.7.1.0.17: ZoneDirector 1100 ZoneDirector 3000 ZoneDirector 5000
General conclusion With the exception of roaming time (WPA1/2-PSK), verified test areas, such as authentication, association, handover and call stability tests, all produced good results. Roaming times with were in the range of 200-250ms for both WPA2-PSK AES and WPA-PSK TKIP. However, when using .1X authentication roaming times were a good 34ms in average. The outcome of the load test was in general acceptable. In both active and U-APSD mode it was possible to keep up 14 simultaneously calls per AP one single access point.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 7 2014-12-02
TEST RESULTS
Ascom WLAN Infrastructure Verification – VoWiFi Software Versions:
Ruckus Wireless ZD 3000 version 9.7.1.0.17 ZF 7962 / 7363 / 7341 / 7343 / 7372 / 7983 and R300 access points Ascom i62, v5.1.30 (WLAN driver 3.5.f)
Signaling Protocol: SIP, Innovaphone IP6000 used as SIP server. Version 9 hotfix 13
Configuration of WLAN System:
Beacon Interval: 100ms DTIM Period: 5 802.11b/g/n 802.11a/n WMM/ U-APSD Enabled 802.11d Regulatory Domain: World mode
Ascom i62 Configuration:
World Mode Regulatory Domain set to World mode. IP DSCP for Voice: 0x2E (46) – Expedited Forwarding IP DSCP for Signaling: 0x1A (26) – Assured Forwarding 31 Transmit Gratuitous ARP: Enable
Keep in mind that security options and power save modes were adjusted according to requirements in individual test cases. Please refer to appendix A for information regarding device configuration.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 8 2014-12-02
APPENDIX A: TEST CONFIGURATIONS
Ruckus Wireless ZD 3000 version 9.7.1.0.17 In the following chapter you will find screenshots and explanations of basic settings in order to get a Ruckus WLAN system to operate with an Ascom i62. Please note that security settings were modified according to requirements in individual test cases.Security settings (PSK)
- Example of how to configure the system for PSK (WPA2-AES)
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 9 2014-12-02
The Advanced Options are left as default
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 10 2014-12-02
Security settings (802.1X / PEAP-MSCHAPv2) Example of how to configure the system for .1X authentication
AAA server dashboard. In the example one Radius servers configured (Interop). See next picture for configuration of the profile “Interop”.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 11 2014-12-02
The IP address and the secret must correspond to the IP and the credential used by the Radius server.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 12 2014-12-02
Configuration of ESS profile for utilization of 802.1X authentication. Authentication server “Interop” corresponds to the server configured in previous step. Note. Depending on which Authentication method used it might be necessary to add a certificate into the i62. PEAP-MSCHAPv2 requires a Root certificate and EAP-TLS requires both a Root certificate and a client certificate. Server certificate validation can be overridden in version 4.1.12 and above per handset setting. Note. Refer to the i62 section in Appendix A for matching handset configurations.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 13 2014-12-02
Make sure background scanning is set to 20s. Background scanning is used to locate access point neighbors. That information is later on used for the PMK distribution.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 14 2014-12-02
General settings (QoS, Radio)
Access points dashboard showing configured access points.
Access points dashboard showing configured access points (continued)
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 15 2014-12-02
Ascom recommended settings for 802.11b/g/n are to only use only channel 1, 6 and 11. Note that in this example the TX power and channel has been modified for test purpose. General guidelines when deploying Ascom i62 handsets (SW version 2.5.7 or later) in 802.11a/n/ac environments:
1. Enabling more than 8 channels will degrade roaming performance. Ascom strongly recommends against going above this limit.
2. Using 40 MHz channels (or “channel-bonding”) will reduce the number of non-DFS* channels to two in ETSI regions (Europe). In FCC regions (North America), 40MHz is a more viable option because of the availability of additional non-DFS channels. The handset can co-exist with 40MHz stations in the same ESS.
3. Make sure that all non-DFS channel are taken before resorting to DFS channels. The
handset can cope in mixed non-DFS and DFS environments; however, due to “unpredictability” introduced by radar detection protocols, voice quality may become distorted and roaming delayed. Hence Ascom recommends avoiding the use of DFS channels in VoWIFI deployments.
*) Dynamic Frequency Selection (radar detection)
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 16 2014-12-02
CLI commands DTIM DTIM 5 value is recommended in order to allow maximum battery conservation without impacting the quality. Using a lower DTIM value is possible but will reduce the standby time slightly.
- First find the WLAN number in your system:
get wlanlist rkscli: get wlanlist name status type wlanID radioID bssid ----------------------------------------------------------- wlan0 up AP wlan0 0 00:1d:2e:02:79:09 wlan1 up AP wlan1 0 00:1d:2e:42:79:09 Then apply the setting to all voice WLANs.
set dtim-period wlan0 5 set dtim-period wlan1 5 The dtim-period setting can be done either by SSH to each access point or via the controller to all access points with the command below.
debug#remote_ap_cli -A set dtim-period wlan0 5 debug#remote_ap_cli -A set dtim-period wlan1 5
Qtime To increase the battery standby time Ascom and Ruckus recommends that the qtime parameter is adjusted. This will increase the standby time from ~40hours to ~100hours.
- Apply setting to the desired radio (2.4/5GHz) or both: set mq wifi0 qtime 2000 2000 4000 4000 set mq wifi1 qtime 2000 2000 4000 4000 The qtime setting can be done either by SSH to each access point or via the controller to all access points with the command below.
debug#remote_ap_cli -A set mq wifi0 qtime 2000 2000 4000 4000 debug#remote_ap_cli -A set mq wifi1 qtime 2000 2000 4000 4000
Ascom i62
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 17 2014-12-02
Recommended i62 setting.
Network settings for WPA2-PSK
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 18 2014-12-02
Network settings for .1X authentication (PEAP-MSCHAPv2)
If 802.1X Authentication is used a root certificate has to be uploaded to the phone by “right clicking” - > Edit certificates. EAP-TLS will require both a root and a client certificate. Note that both a root and a client certificate are needed for TLS. Otherwise only a root certificate is needed. Server certificate validation can be overridden in version 4.1.12 and above per handset setting.
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 19 2014-12-02
Innovaphone IP6000 (IP PBX) The Innovaphone IP6000 was configured with a static IP. Signaling is less relevant here since testing homes in on interoperability in relation to the WLAN infrastructure and not features of the IP PBX. During the tests the IP6000 also was used as DHCP server. IP6000 configuration: See attached file (complete-IP6000-08-03-a6.txt) for IP6000 configuration
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 20 2014-12-02
APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 25 Fail 0 Comments 2 Untested 5 Total 33 See attached file (WLANinteroperabilityTestReport_Ruckus_9_7.xls) for detailed test results. Please refer to the test specification for WLAN systems on Ascom’s interoperability web page for explicit information regarding each test case. See URL (requires login): https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability
-
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 21 2014-12-02
Document History Rev Date Author DescriptionPA 2012-12-07 SEKMO Draft 1 R1 2012-12-20 SEKMO Minor corrections after review. R1 state R2 2013-11-01 SEKMO Typo on front page (7963 - > 7962). R2 R3 2014-04-14 SEKMO Updated with ZF7372/7982 and version 9.7 R3a 2014-04-29 SEKMO Corrected a few typos R3b 2014-07-22 SEKMO Updated with 9.7.1 after re-test R3c 2014-12-02 SEKMO Added ZF R300
WLAN TR
WLAN Interoperability Test ReportWLAN configuration:
Beacon Interval: 100ms
Test object - Handset:DTIM Interval: 5
Ascomi62 sw version 5.1.30802.11d Regulatory Domain: XX
Test object - WLAN system:WMM Enabled (Auto/WMM)
Ruckus ZD3000 v 9.7.0.220 (and 9.7.1.0.17)No Auto-tune
ZF7982, 7372 (regression test ZF7962 and ZF7363)ZF 7982ZF7372ZF7962ZF7363Single Voice VLAN
2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz
Test CaseDescriptionVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictComment
TEST AREA ASSOCIATION / AUTHENTICATION
#101Association with open authentication, no encryptionPASSPASSPASSPASSPASSPASSPASSPASS
#104Association with WPA-PSK authentication, TKIP encryptionPASSPASSPASSPASSPASSPASSPASSPASS
#105Association with WPA-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASS
#106Association with WPA2-PSK authentication, TKIP encryptionPASSPASSPASSPASSPASSPASSPASSPASS
#107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASS
#110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSFreeRadius. Server cert validations = onFAIL
#111Association with EAP-FAST authenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED
#115Association with multiple ESSIDs on APPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDSee Comment
#116Association with EAP-TLS authenticationPASSPASSPASSPASSPASSPASSPASSPASSFreeRadius. Server cert validations = on
TEST AREA POWER-SAVE AND QOSPASS
#150802.11 Power-save modePASSPASSPASSPASSPASSPASSPASSPASSFAIL
#151Beacon period and DTIM intervalPASSPASSPASSPASSPASSPASSPASSPASStested DTIM 1 and 5 (has to be set in CLI). Beacon period 100tuNOT TESTED
#152802.11e U-APSDPASSPASSPASSPASSPASSPASSPASSPASSSee Comment
#202WMM prioritizationPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDload generated with iperf. OK
TEST AREA "PERFORMANCE"
#301Active mode - unencryptedPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDZF7982: 14 in bgn mode and 16 in an. ZF7372: 16 handset on one single AP (both bgn and an mode)
#303Active mode – encrypted with WPA2-PSKPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDZF7982: 14 in bgn mode and 16 in an. ZF7372: 16 handset on one single AP (both bgn and an mode)
#308Power-save mode U-APSD – WPA2-PSKPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDZF7982: 14 in bgn mode and 16 in an. ZF7372: 16 handset on one single AP (both bgn and an mode)
#310CAC - TSPECPASSPASSPASSPASSPASSPASSPASSPASS
TEST AREA ROAMING AND HANDOVER TIMES
#401Handover with open authentication and no encryptionPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED73: a 23ms, gn: 32ms 79: a 26ms, bg 30ms
#403Handover with WPA-PSK authentication and TKIP encryptionSee CommentSee CommentSee CommentSee CommentNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDM1 key delayed after re-assoc | 7372: an 219ms, gn: 222ms | 7982: an 218ms, bg 217ms
#404Handover with WPA2-PSK auth and AES-CCMP encryptionSee CommentSee CommentSee CommentSee CommentPASSPASSPASSPASSM1 key delayed after re-assoc | 7372: an 240ms, gn: 242ms | 7982: an 217ms, bg 245ms | 7962and 7363: an 240ms bgn 250ms
#408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASS7372: an 58ms, gn: 37ms | 7982: an 51ms, bg 34ms | 7962and 7363: an 49ms bgn 33ms
#410Handover using PMKSA cachingPASSPASSPASSPASSPASSPASSPASSPASSAlways on See #408
#411Handover using PMKSA and opportunistic/proactive key cachingPASSPASSPASSPASSPASSPASSPASSPASSAlways on See #408
#412PreauthenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED
ch
TEST AREA BATTERY LIFETIME
#501Battery lifetime in idlePASSPASSPASSPASSPASSPASSNOT TESTEDNOT TESTED80-100h
#502Battery lifetime in call with no power savePASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED3h+
#504Battery lifetime in call with power save mode U-APSDPASSPASSPASSPASSPASSPASSNOT TESTEDNOT TESTED12-15h in U-APSD mode
TEST AREA STABILITY
#601Duration of call – Active modePASSPASSPASSPASSPASSPASSPASSPASS24h + call maintained
#602Duration of call – U-APSD modePASSPASSPASSPASSPASSPASSPASSPASS24h + call maintained
TEST AREA 802.11n
#801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED
#802Frame aggregation A-MPDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED
#80440Mhz channelsNOT TESTEDPASSNOT TESTEDPASSNOT TESTEDPASSNOT TESTEDPASS20 and 40 MHz verified for .11an
#805802.11n ratesPASSPASSPASSPASSPASSPASSPASSPASSBoth
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.07.22 10:24:35 =~=~=~=~=~=~=~=~=~=~=~=show techsupport
System Overview:
Name= ruckus
IP Address= 192.168.0.18
MAC Address= 00:22:7F:0C:38:7A
Uptime= 27d 4h 24m
Model= ZD3025
Licensed APs= 25
Serial Number= 320833000446
Version= 9.7.1.0 build 17
Devices Overview:
Number of APs= 0
Number of Client Devices= 0
Number of Rogue Devices= 0
Usage Summary:
Usage of 1 hr:
Max. Concurrent Users= 0
Bytes Transmitted= 0B
Number of Rogue Devices= 0
Usage of 24 hr:
Max. Concurrent Users= 0
Bytes Transmitted= 0B
Number of Rogue Devices= 0
Memory Utilization:
Used Bytes= 148148224
Used Percentage= 14%
Free Bytes= 908115968
Free Percentage= 86%
Protocol Mode= IPv4-Only
Device IP Address:
Mode= Manual
IP Address= 192.168.0.18
Netmask= 255.255.255.0
Gateway Address= 192.168.0.50
Primary DNS=
Secondary DNS=
Management VLAN:
VLAN ID= 1
Country Code:
Code= United States
Identity:
Name= ruckus
Session Statistics:
Enable= false
Limited Unauthorized Session= true
NTP:
Status= Enabled
Address= ntp.ruckuswireless.com
Log:
Status= Disabled
Address=
Facility=
Priority=
AP Facility=
AP Priority=
Tunnel MTU:
Tunnel MTU= 1500
Bonjour Service:
Status= Enabled
Telnet Server:
Status= Disabled
FTP Server:
Status= Enabled
Anonynous Status= Enabled
FlexMaster:
Status= Disabled
Address=
Interval= 15
AAA:
ID:
1:
Name= Local Database
Type= Local
2:
Name= Guest Accounts
Type= Guest
3:
Name= Interop
Type= RADIUS server
Auth Method= pap
Primary RADIUS:
IP Address= 192.168.0.2
Port= 1812
Secret= ******
Secondary RADIUS:
Status= Disabled
Retry Policy:
Request Timeout= 3 Seconds
Max. Number of Retries= 2 Times
DHCP servers for DHCP relay agent:
Administrator Name/Password:
Name= admin
Password= changeme
Authenticate:
Mode= Authenticate using the admin name and password
Management ACL:
AP:
ID:
1:
MAC Address= c4:10:8a:3c:f3:e0
Model= zf7363
Approved= Yes
Device Name= AP4_7363
Description=
Location= AP4
GPS=
CERT = Normal
Group Name= System Default
Channel Range:
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
A/N= 36,40,44,48,149,153,157,161 (Disallowed= 165)
Radio b/g/n:
Channelization= 20
Channel= 6
WLAN Services enabled= Yes
Tx. Power= Min
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio a/n:
Channelization= 20
Channel= 36
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= Static
IP Address= 192.168.0.141
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Manual
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
Venue Name List:
2:
MAC Address= c4:10:8a:3c:f3:c0
Model= zf7363
Approved= Yes
Device Name= AP3_7363
Description=
Location= AP3
GPS=
CERT = Normal
Group Name= System Default
Channel Range:
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
Radio b/g/n:
Channelization= 20
Channel= 11
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio a/n:
Channelization= 40
Channel= 40
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= Static
IP Address= 192.168.0.210
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Manual
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
Venue Name List:
3:
MAC Address= 04:4f:aa:03:78:40
Model= zf7962
Approved= Yes
Device Name= AP1_7962
Description=
Location= AP1
GPS=
CERT = Normal
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 44
WLAN Services enabled= No
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 6
WLAN Services enabled= No
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= Static
IP Address= 192.168.0.207
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Manual
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
Venue Name List:
4:
MAC Address= 04:4f:aa:03:7a:10
Model= zf7962
Approved= Yes
Device Name= AP2_7962
Description=
Location= AP2
GPS=
CERT = Normal
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 36
WLAN Services enabled= Yes
Tx. Power= -5dB
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 1
WLAN Services enabled= Yes
Tx. Power= -5dB
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= Static
IP Address= 192.168.0.174
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Manual
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
Venue Name List:
5:
MAC Address= 24:c9:a1:04:21:60
Model= zf7372
Approved= Yes
Device Name= AP7300
Description=
Location=
GPS=
CERT = Complex
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 36
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 6
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= Static
IP Address= 192.168.0.147
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Manual
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
Venue Name List:
6:
MAC Address= 2c:e6:cc:1f:6a:50
Model= zf7982
Approved= Yes
Device Name= AP7900
Description=
Location=
GPS=
CERT = Complex
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 44
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 1
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= Static
IP Address= 192.168.0.146
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Manual
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
Venue Name List:
Smart Redundancy:
Status= Disabled
Peer IP/IPv6 Address=
Shared Secret=
IPv4 Management Interface:
Status= Disabled
IP Address=
Netmask=
Gateway Status= Disabled
Gateway Address=
VLAN= 1
IPv6 Management Interface:
Status= Disabled
IPv6 Address=
IPv6 Prefix=
Gateway Status= Disabled
Gateway Address=
VLAN= 1
L2/MAC ACL:
ID:
1:
Name= System
Description= System
Restriction= Deny only the stations listed below
Stations:
SNMP Agent:
Status= Disabled
Contact= [email protected]
Location= 880 W Maude Ave. Sunnyvale, CA 94085 US
RO Community= public
RW Community= private
SNMP Trap:
Status= Disabled
Format= Version2
SNMPV3 Agent:
Status= Disabled
Ro:
User=
Authentication Type= MD5
Authentication Pass Phrase=
Privacy Type= DES
Privacy Phrase=
Rw:
User=
Authentication Type= MD5
Authentication Pass Phrase=
Privacy Type= DES
Privacy Phrase=
SNMP Trap:
Status= Disabled
Format= Version2
WLAN Service:
ID:
1:
NAME = RuckusIntop
Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps
Beacon Interval = 100ms
SSID = ascomwpa2-psk
Description = RuckusIntop
Type = Standard Usage
Authentication = open
Encryption = none
Web Authentication = Disabled
Authentication Server = Disabled
Called-Station-Id type = wlan-bssid
Tunnel Mode = Disabled
Background Scanning = Enabled
Max. Clients = 100
Isolation per AP = Disabled
Isolation across AP = Disabled
Zero-IT Activation = Enabled
Priority = High
Load Balancing = Enabled
Rate Limiting Uplink = Disabled
Rate Limiting Downlink = Disabled
Auto-Proxy configuration:
Status = Disabled
Inactivity Timeout:
Status = Enabled
Timeout = 5 Minutes
VLAN-ID = 1
Dynamic VLAN = Disabled
Closed System = Disabled
OFDM-Only State = Disabled
Multicast Filter State = Disabled
802.11d State = Enabled
Force DHCP State = Disabled
Force DHCP Timeout = 10
DHCP Option82 State = Disabled
Ignore unauthorized client statistic = Disabled
STA Info Extraction State = Enabled
BSS Minrate = Disabled
Call Admission Control State = Disabled
PMK Cache Timeout= 720 minutes
PMK Cache for Reconnect= Enabled
NAS-ID Type= wlan-bssid
Roaming Acct-Interim-Update= Disabled
PAP Message Authenticator = Enabled
Send EAP-Failure = Disabled
L2/MAC = No ACLS
L3/L4/IP Address = No ACLS
L3/L4/IPv6 Address = No ACLS
Precedence = Default
Proxy ARP = Disabled
Device Policy = No ACLS
SmartRoam = Disabled Roam-factor = 5
White List = No ACLS
WLAN Group:
ID:
1:
Name= Default
Description= Default WLANs for Access Points
WLAN Service:
WLAN1:
NAME= RuckusIntop
VLAN=
ruckus#