interoperability report ascom i62 ruckus wireless, zf7962 ... › ascompartnerweb › global ›...

21
Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 1 2014-12-02 INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, ZF7962, 7363, 7341, 7343, 7372, 7982 and R300 access points i62 and OEM derivatives version 5.1.30 Ruckus wireless version 9.7.1.0.17 Ascom, Gothenburg July 2014 [ ]

Upload: others

Post on 04-Jul-2020

18 views

Category:

Documents


0 download

TRANSCRIPT

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 1 2014-12-02

    INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, ZF7962, 7363, 7341, 7343, 7372, 7982 and R300 access points i62 and OEM derivatives version 5.1.30

    Ruckus wireless version 9.7.1.0.17

    Ascom, Gothenburg

    July 2014

    [ ]

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 2 2014-12-02

    TABLE OF CONTENT: INTRODUCTION ........................................................................................................................... 3 

    About Ascom ............................................................................................................................ 3 About Ruckus Wireless ............................................................................................................. 3 

    SITE INFORMATION .................................................................................................................... 4 SUMMARY .................................................................................................................................... 5 

    Known issues ............................................................................................................................ 6 Compatibility information .......................................................................................................... 6 General conclusion ................................................................................................................... 6 

    TEST RESULTS ............................................................................................................................ 7 Ascom WLAN Infrastructure Verification – VoWiFi ................................................................... 7 

    APPENDIX A: TEST CONFIGURATIONS .................................................................................... 8 Ruckus Wireless ZD 3000 version 9.7.1.0.17 ........................................................................... 8 

    Security settings (802.1X / PEAP-MSCHAPv2) .................................................................. 10 General settings (QoS, Radio) ............................................................................................ 14 CLI commands .................................................................................................................... 16 

    Innovaphone IP6000 (IP PBX) ................................................................................................ 19 APPENDIX B: DETAILED TEST RECORDS .............................................................................. 20 

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 3 2014-12-02

    INTRODUCTION This document describes necessary steps and guidelines to optimally configure Ruckus wireless platform with Ascom i62 VoWiFi handsets.

    The guide should be used in conjunction with both Ruckus and Ascoms configuration guide(s).

    About Ascom Ascom Wireless Solutions (www.ascom.com/ws) is a leading provider of on-site wireless communications for key segments such as hospitals, elderly care, independent living, manufacturing industries, secure establishments,retail and hotels. More than 75,000 systems are installed at major companies all over the world. The company offers a broad range of voice and professional messaging solutions, creating value for customers by supporting and optimizing their Mission-Critical processes. The solutions are based on VoWiFi, IP-DECT, nurse call and paging technologies, smartly integrated into existing enterprise systems. The company has subsidiaries in 11 countries and 1,200 employees worldwide. Founded in 1955 and based in Göteborg, Sweden, Ascom Wireless Solutions is part of the Ascom Group, listed on the Swiss Stock Exchange.

    About Ruckus Wireless The Ruckus ZoneFlex system is a centrally managed WLAN system comprising of controllers and a variety of 802.11 a/b/g/n APs. There are two unique features in the ZoneFlex product that enhance voice communications. One is BeamFlex, our smart beamforming antennas, and the second is SmartCast, our traffic management engine. Combining a compact internal antenna array with expert control software, BeamFlex continuously ranks the antenna configurations for each receiving device and reconfigures itself in real-time to bypass interference and physical barriers. SmartCast provides automatic flow classification, software pre-queuing per station and per packet scheduling of traffic over the smart antenna array. It applies heuristics to automatically classify voice packets and place them in the right queue.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 4 2014-12-02

    SITE INFORMATION

    Test Site: Ascom US 300 Perimeter park drive Morrisville, NC, US-27560 USA Participants: Karl-Magnus Olsson, Ascom HQ, Gothenburg Sweden TEST TOPOLOGY

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 5 2014-12-02

    SUMMARY Please refer to Appendix B for detailed results. WLAN Controller Features

    High Level Functionality Result Association, Open with No Encryption OK Association, WPA-PSK, TKIP OK Association, WPA2-PSK, TKIP / AES Encryption OK Association, PEAP-MSCHAPv2 Auth., TKIP Encryption OK Association, PEAP-MSCHAPv2 Auth., AES Encryption OK Association, Multiple ESSIDs OK Beacon Interval and DTIM Period OK Preauthentication Not supported by controller PMKSA Caching OK WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK Active Mode (load test) OK 802.11 Power-save mode OK 802.11e U-APSD OK 802.11e U-APSD (load test) OK Roaming

    High Level Functionality Result Roaming, Open with No Encryption OK Roaming, WPA-PSK, TKIP Encryption OK (Typical roaming time 218ms)*

    Roaming, WPA2-PSK, AES Encryption OK (Typical roaming time 245ms)* Roaming, PEAP-MSCHAPv2 Auth, AES Encryption OK (Typical roaming time 34ms)* /** *) Average roaming times are measured using 802.11bgn on ZF7982. Refer to Appendix B for detailed test results * *) Measured times is with opportunistic/proactive Key Caching enabled (default enabled)

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 6 2014-12-02

    Known issues

    - Note that the “qtime” settings described in the “CLI settings” section is necessary for optimal battery life. Refer to Ascom ticket 20409

    For additional information regarding the known issues please contact [email protected] or [email protected]

    Compatibility information A full test round was performed on ZF7982 and ZF7372 while a less extensive test was performed on the already known access points ZF 7962 and ZF 7363. All test were done with a ZD3000 controller. We ensure compatibility/interoperability with all the access points and controllers listed below given that they run the software tested. i62 version 5.1.30 is using WLAN driver version 3.5.f. Supported access ports with Ruckus Wireless version 9.7.1.0.17: ZoneFlex 7962 ZoneFlex 7363 ZoneFlex 7341/7343 (Single radio versions of 7363) ZoneFlex 7372 ZoneFlex 7982 ZoneFlex R300 Supported controller platforms with Ruckus Wireless version 9.7.1.0.17: ZoneDirector 1100 ZoneDirector 3000 ZoneDirector 5000

    General conclusion With the exception of roaming time (WPA1/2-PSK), verified test areas, such as authentication, association, handover and call stability tests, all produced good results. Roaming times with were in the range of 200-250ms for both WPA2-PSK AES and WPA-PSK TKIP. However, when using .1X authentication roaming times were a good 34ms in average. The outcome of the load test was in general acceptable. In both active and U-APSD mode it was possible to keep up 14 simultaneously calls per AP one single access point.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 7 2014-12-02

    TEST RESULTS

    Ascom WLAN Infrastructure Verification – VoWiFi Software Versions:

    Ruckus Wireless ZD 3000 version 9.7.1.0.17 ZF 7962 / 7363 / 7341 / 7343 / 7372 / 7983 and R300 access points Ascom i62, v5.1.30 (WLAN driver 3.5.f)

    Signaling Protocol: SIP, Innovaphone IP6000 used as SIP server. Version 9 hotfix 13

    Configuration of WLAN System:

    Beacon Interval: 100ms DTIM Period: 5 802.11b/g/n 802.11a/n WMM/ U-APSD Enabled 802.11d Regulatory Domain: World mode

    Ascom i62 Configuration:

    World Mode Regulatory Domain set to World mode. IP DSCP for Voice: 0x2E (46) – Expedited Forwarding IP DSCP for Signaling: 0x1A (26) – Assured Forwarding 31 Transmit Gratuitous ARP: Enable

    Keep in mind that security options and power save modes were adjusted according to requirements in individual test cases. Please refer to appendix A for information regarding device configuration.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 8 2014-12-02

    APPENDIX A: TEST CONFIGURATIONS

    Ruckus Wireless ZD 3000 version 9.7.1.0.17 In the following chapter you will find screenshots and explanations of basic settings in order to get a Ruckus WLAN system to operate with an Ascom i62. Please note that security settings were modified according to requirements in individual test cases.Security settings (PSK)

    - Example of how to configure the system for PSK (WPA2-AES)

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 9 2014-12-02

    The Advanced Options are left as default

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 10 2014-12-02

    Security settings (802.1X / PEAP-MSCHAPv2) Example of how to configure the system for .1X authentication

    AAA server dashboard. In the example one Radius servers configured (Interop). See next picture for configuration of the profile “Interop”.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 11 2014-12-02

    The IP address and the secret must correspond to the IP and the credential used by the Radius server.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 12 2014-12-02

    Configuration of ESS profile for utilization of 802.1X authentication. Authentication server “Interop” corresponds to the server configured in previous step. Note. Depending on which Authentication method used it might be necessary to add a certificate into the i62. PEAP-MSCHAPv2 requires a Root certificate and EAP-TLS requires both a Root certificate and a client certificate. Server certificate validation can be overridden in version 4.1.12 and above per handset setting. Note. Refer to the i62 section in Appendix A for matching handset configurations.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 13 2014-12-02

    Make sure background scanning is set to 20s. Background scanning is used to locate access point neighbors. That information is later on used for the PMK distribution.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 14 2014-12-02

    General settings (QoS, Radio)

    Access points dashboard showing configured access points.

    Access points dashboard showing configured access points (continued)

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 15 2014-12-02

    Ascom recommended settings for 802.11b/g/n are to only use only channel 1, 6 and 11. Note that in this example the TX power and channel has been modified for test purpose. General guidelines when deploying Ascom i62 handsets (SW version 2.5.7 or later) in 802.11a/n/ac environments:

    1. Enabling more than 8 channels will degrade roaming performance. Ascom strongly recommends against going above this limit.

    2. Using 40 MHz channels (or “channel-bonding”) will reduce the number of non-DFS* channels to two in ETSI regions (Europe). In FCC regions (North America), 40MHz is a more viable option because of the availability of additional non-DFS channels. The handset can co-exist with 40MHz stations in the same ESS.

    3. Make sure that all non-DFS channel are taken before resorting to DFS channels. The

    handset can cope in mixed non-DFS and DFS environments; however, due to “unpredictability” introduced by radar detection protocols, voice quality may become distorted and roaming delayed. Hence Ascom recommends avoiding the use of DFS channels in VoWIFI deployments.

    *) Dynamic Frequency Selection (radar detection)

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 16 2014-12-02

    CLI commands DTIM DTIM 5 value is recommended in order to allow maximum battery conservation without impacting the quality. Using a lower DTIM value is possible but will reduce the standby time slightly.

    - First find the WLAN number in your system:

    get wlanlist rkscli: get wlanlist name status type wlanID radioID bssid ----------------------------------------------------------- wlan0 up AP wlan0 0 00:1d:2e:02:79:09 wlan1 up AP wlan1 0 00:1d:2e:42:79:09 Then apply the setting to all voice WLANs.

    set dtim-period wlan0 5 set dtim-period wlan1 5 The dtim-period setting can be done either by SSH to each access point or via the controller to all access points with the command below.

    debug#remote_ap_cli -A set dtim-period wlan0 5 debug#remote_ap_cli -A set dtim-period wlan1 5

    Qtime To increase the battery standby time Ascom and Ruckus recommends that the qtime parameter is adjusted. This will increase the standby time from ~40hours to ~100hours.

    - Apply setting to the desired radio (2.4/5GHz) or both: set mq wifi0 qtime 2000 2000 4000 4000 set mq wifi1 qtime 2000 2000 4000 4000 The qtime setting can be done either by SSH to each access point or via the controller to all access points with the command below.

    debug#remote_ap_cli -A set mq wifi0 qtime 2000 2000 4000 4000 debug#remote_ap_cli -A set mq wifi1 qtime 2000 2000 4000 4000

    Ascom i62

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 17 2014-12-02

    Recommended i62 setting.

    Network settings for WPA2-PSK

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 18 2014-12-02

    Network settings for .1X authentication (PEAP-MSCHAPv2)

    If 802.1X Authentication is used a root certificate has to be uploaded to the phone by “right clicking” - > Edit certificates. EAP-TLS will require both a root and a client certificate. Note that both a root and a client certificate are needed for TLS. Otherwise only a root certificate is needed. Server certificate validation can be overridden in version 4.1.12 and above per handset setting.

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 19 2014-12-02

    Innovaphone IP6000 (IP PBX) The Innovaphone IP6000 was configured with a static IP. Signaling is less relevant here since testing homes in on interoperability in relation to the WLAN infrastructure and not features of the IP PBX. During the tests the IP6000 also was used as DHCP server. IP6000 configuration: See attached file (complete-IP6000-08-03-a6.txt) for IP6000 configuration

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 20 2014-12-02

    APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 25 Fail 0 Comments 2 Untested 5 Total 33 See attached file (WLANinteroperabilityTestReport_Ruckus_9_7.xls) for detailed test results. Please refer to the test specification for WLAN systems on Ascom’s interoperability web page for explicit information regarding each test case. See URL (requires login): https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability

  • Interoperability Report - Ascom i62 – Ruckus ZF7363/7962/7341/7343 21 2014-12-02

    Document History Rev Date Author DescriptionPA 2012-12-07 SEKMO Draft 1 R1 2012-12-20 SEKMO Minor corrections after review. R1 state R2 2013-11-01 SEKMO Typo on front page (7963 - > 7962). R2 R3 2014-04-14 SEKMO Updated with ZF7372/7982 and version 9.7 R3a 2014-04-29 SEKMO Corrected a few typos R3b 2014-07-22 SEKMO Updated with 9.7.1 after re-test R3c 2014-12-02 SEKMO Added ZF R300

    WLAN TR

    WLAN Interoperability Test ReportWLAN configuration:

    Beacon Interval: 100ms

    Test object - Handset:DTIM Interval: 5

    Ascomi62 sw version 5.1.30802.11d Regulatory Domain: XX

    Test object - WLAN system:WMM Enabled (Auto/WMM)

    Ruckus ZD3000 v 9.7.0.220 (and 9.7.1.0.17)No Auto-tune

    ZF7982, 7372 (regression test ZF7962 and ZF7363)ZF 7982ZF7372ZF7962ZF7363Single Voice VLAN

    2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz

    Test CaseDescriptionVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictComment

    TEST AREA ASSOCIATION / AUTHENTICATION

    #101Association with open authentication, no encryptionPASSPASSPASSPASSPASSPASSPASSPASS

    #104Association with WPA-PSK authentication, TKIP encryptionPASSPASSPASSPASSPASSPASSPASSPASS

    #105Association with WPA-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASS

    #106Association with WPA2-PSK authentication, TKIP encryptionPASSPASSPASSPASSPASSPASSPASSPASS

    #107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASS

    #110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSFreeRadius. Server cert validations = onFAIL

    #111Association with EAP-FAST authenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #115Association with multiple ESSIDs on APPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDSee Comment

    #116Association with EAP-TLS authenticationPASSPASSPASSPASSPASSPASSPASSPASSFreeRadius. Server cert validations = on

    TEST AREA POWER-SAVE AND QOSPASS

    #150802.11 Power-save modePASSPASSPASSPASSPASSPASSPASSPASSFAIL

    #151Beacon period and DTIM intervalPASSPASSPASSPASSPASSPASSPASSPASStested DTIM 1 and 5 (has to be set in CLI). Beacon period 100tuNOT TESTED

    #152802.11e U-APSDPASSPASSPASSPASSPASSPASSPASSPASSSee Comment

    #202WMM prioritizationPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDload generated with iperf. OK

    TEST AREA "PERFORMANCE"

    #301Active mode - unencryptedPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDZF7982: 14 in bgn mode and 16 in an. ZF7372: 16 handset on one single AP (both bgn and an mode)

    #303Active mode – encrypted with WPA2-PSKPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDZF7982: 14 in bgn mode and 16 in an. ZF7372: 16 handset on one single AP (both bgn and an mode)

    #308Power-save mode U-APSD – WPA2-PSKPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDZF7982: 14 in bgn mode and 16 in an. ZF7372: 16 handset on one single AP (both bgn and an mode)

    #310CAC - TSPECPASSPASSPASSPASSPASSPASSPASSPASS

    TEST AREA ROAMING AND HANDOVER TIMES

    #401Handover with open authentication and no encryptionPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED73: a 23ms, gn: 32ms 79: a 26ms, bg 30ms

    #403Handover with WPA-PSK authentication and TKIP encryptionSee CommentSee CommentSee CommentSee CommentNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDM1 key delayed after re-assoc | 7372: an 219ms, gn: 222ms | 7982: an 218ms, bg 217ms

    #404Handover with WPA2-PSK auth and AES-CCMP encryptionSee CommentSee CommentSee CommentSee CommentPASSPASSPASSPASSM1 key delayed after re-assoc | 7372: an 240ms, gn: 242ms | 7982: an 217ms, bg 245ms | 7962and 7363: an 240ms bgn 250ms

    #408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASS7372: an 58ms, gn: 37ms | 7982: an 51ms, bg 34ms | 7962and 7363: an 49ms bgn 33ms

    #410Handover using PMKSA cachingPASSPASSPASSPASSPASSPASSPASSPASSAlways on See #408

    #411Handover using PMKSA and opportunistic/proactive key cachingPASSPASSPASSPASSPASSPASSPASSPASSAlways on See #408

    #412PreauthenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    ch

    TEST AREA BATTERY LIFETIME

    #501Battery lifetime in idlePASSPASSPASSPASSPASSPASSNOT TESTEDNOT TESTED80-100h

    #502Battery lifetime in call with no power savePASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED3h+

    #504Battery lifetime in call with power save mode U-APSDPASSPASSPASSPASSPASSPASSNOT TESTEDNOT TESTED12-15h in U-APSD mode

    TEST AREA STABILITY

    #601Duration of call – Active modePASSPASSPASSPASSPASSPASSPASSPASS24h + call maintained

    #602Duration of call – U-APSD modePASSPASSPASSPASSPASSPASSPASSPASS24h + call maintained

    TEST AREA 802.11n

    #801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #802Frame aggregation A-MPDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #80440Mhz channelsNOT TESTEDPASSNOT TESTEDPASSNOT TESTEDPASSNOT TESTEDPASS20 and 40 MHz verified for .11an

    #805802.11n ratesPASSPASSPASSPASSPASSPASSPASSPASSBoth

    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.07.22 10:24:35 =~=~=~=~=~=~=~=~=~=~=~=show techsupport

    System Overview:

    Name= ruckus

    IP Address= 192.168.0.18

    MAC Address= 00:22:7F:0C:38:7A

    Uptime= 27d 4h 24m

    Model= ZD3025

    Licensed APs= 25

    Serial Number= 320833000446

    Version= 9.7.1.0 build 17

    Devices Overview:

    Number of APs= 0

    Number of Client Devices= 0

    Number of Rogue Devices= 0

    Usage Summary:

    Usage of 1 hr:

    Max. Concurrent Users= 0

    Bytes Transmitted= 0B

    Number of Rogue Devices= 0

    Usage of 24 hr:

    Max. Concurrent Users= 0

    Bytes Transmitted= 0B

    Number of Rogue Devices= 0

    Memory Utilization:

    Used Bytes= 148148224

    Used Percentage= 14%

    Free Bytes= 908115968

    Free Percentage= 86%

    Protocol Mode= IPv4-Only

    Device IP Address:

    Mode= Manual

    IP Address= 192.168.0.18

    Netmask= 255.255.255.0

    Gateway Address= 192.168.0.50

    Primary DNS=

    Secondary DNS=

    Management VLAN:

    VLAN ID= 1

    Country Code:

    Code= United States

    Identity:

    Name= ruckus

    Session Statistics:

    Enable= false

    Limited Unauthorized Session= true

    NTP:

    Status= Enabled

    Address= ntp.ruckuswireless.com

    Log:

    Status= Disabled

    Address=

    Facility=

    Priority=

    AP Facility=

    AP Priority=

    Tunnel MTU:

    Tunnel MTU= 1500

    Bonjour Service:

    Status= Enabled

    Telnet Server:

    Status= Disabled

    FTP Server:

    Status= Enabled

    Anonynous Status= Enabled

    FlexMaster:

    Status= Disabled

    Address=

    Interval= 15

    AAA:

    ID:

    1:

    Name= Local Database

    Type= Local

    2:

    Name= Guest Accounts

    Type= Guest

    3:

    Name= Interop

    Type= RADIUS server

    Auth Method= pap

    Primary RADIUS:

    IP Address= 192.168.0.2

    Port= 1812

    Secret= ******

    Secondary RADIUS:

    Status= Disabled

    Retry Policy:

    Request Timeout= 3 Seconds

    Max. Number of Retries= 2 Times

    DHCP servers for DHCP relay agent:

    Administrator Name/Password:

    Name= admin

    Password= changeme

    Authenticate:

    Mode= Authenticate using the admin name and password

    Management ACL:

    AP:

    ID:

    1:

    MAC Address= c4:10:8a:3c:f3:e0

    Model= zf7363

    Approved= Yes

    Device Name= AP4_7363

    Description=

    Location= AP4

    GPS=

    CERT = Normal

    Group Name= System Default

    Channel Range:

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= 165)

    Radio b/g/n:

    Channelization= 20

    Channel= 6

    WLAN Services enabled= Yes

    Tx. Power= Min

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio a/n:

    Channelization= 20

    Channel= 36

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= Static

    IP Address= 192.168.0.141

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Manual

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    Venue Name List:

    2:

    MAC Address= c4:10:8a:3c:f3:c0

    Model= zf7363

    Approved= Yes

    Device Name= AP3_7363

    Description=

    Location= AP3

    GPS=

    CERT = Normal

    Group Name= System Default

    Channel Range:

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    Radio b/g/n:

    Channelization= 20

    Channel= 11

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio a/n:

    Channelization= 40

    Channel= 40

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= Static

    IP Address= 192.168.0.210

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Manual

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    Venue Name List:

    3:

    MAC Address= 04:4f:aa:03:78:40

    Model= zf7962

    Approved= Yes

    Device Name= AP1_7962

    Description=

    Location= AP1

    GPS=

    CERT = Normal

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 44

    WLAN Services enabled= No

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 6

    WLAN Services enabled= No

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= Static

    IP Address= 192.168.0.207

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Manual

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    Venue Name List:

    4:

    MAC Address= 04:4f:aa:03:7a:10

    Model= zf7962

    Approved= Yes

    Device Name= AP2_7962

    Description=

    Location= AP2

    GPS=

    CERT = Normal

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 36

    WLAN Services enabled= Yes

    Tx. Power= -5dB

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 1

    WLAN Services enabled= Yes

    Tx. Power= -5dB

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= Static

    IP Address= 192.168.0.174

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Manual

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    Venue Name List:

    5:

    MAC Address= 24:c9:a1:04:21:60

    Model= zf7372

    Approved= Yes

    Device Name= AP7300

    Description=

    Location=

    GPS=

    CERT = Complex

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 36

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 6

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= Static

    IP Address= 192.168.0.147

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Manual

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    Venue Name List:

    6:

    MAC Address= 2c:e6:cc:1f:6a:50

    Model= zf7982

    Approved= Yes

    Device Name= AP7900

    Description=

    Location=

    GPS=

    CERT = Complex

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 44

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 1

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= Static

    IP Address= 192.168.0.146

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Manual

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    Venue Name List:

    Smart Redundancy:

    Status= Disabled

    Peer IP/IPv6 Address=

    Shared Secret=

    IPv4 Management Interface:

    Status= Disabled

    IP Address=

    Netmask=

    Gateway Status= Disabled

    Gateway Address=

    VLAN= 1

    IPv6 Management Interface:

    Status= Disabled

    IPv6 Address=

    IPv6 Prefix=

    Gateway Status= Disabled

    Gateway Address=

    VLAN= 1

    L2/MAC ACL:

    ID:

    1:

    Name= System

    Description= System

    Restriction= Deny only the stations listed below

    Stations:

    SNMP Agent:

    Status= Disabled

    Contact= [email protected]

    Location= 880 W Maude Ave. Sunnyvale, CA 94085 US

    RO Community= public

    RW Community= private

    SNMP Trap:

    Status= Disabled

    Format= Version2

    SNMPV3 Agent:

    Status= Disabled

    Ro:

    User=

    Authentication Type= MD5

    Authentication Pass Phrase=

    Privacy Type= DES

    Privacy Phrase=

    Rw:

    User=

    Authentication Type= MD5

    Authentication Pass Phrase=

    Privacy Type= DES

    Privacy Phrase=

    SNMP Trap:

    Status= Disabled

    Format= Version2

    WLAN Service:

    ID:

    1:

    NAME = RuckusIntop

    Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps

    Beacon Interval = 100ms

    SSID = ascomwpa2-psk

    Description = RuckusIntop

    Type = Standard Usage

    Authentication = open

    Encryption = none

    Web Authentication = Disabled

    Authentication Server = Disabled

    Called-Station-Id type = wlan-bssid

    Tunnel Mode = Disabled

    Background Scanning = Enabled

    Max. Clients = 100

    Isolation per AP = Disabled

    Isolation across AP = Disabled

    Zero-IT Activation = Enabled

    Priority = High

    Load Balancing = Enabled

    Rate Limiting Uplink = Disabled

    Rate Limiting Downlink = Disabled

    Auto-Proxy configuration:

    Status = Disabled

    Inactivity Timeout:

    Status = Enabled

    Timeout = 5 Minutes

    VLAN-ID = 1

    Dynamic VLAN = Disabled

    Closed System = Disabled

    OFDM-Only State = Disabled

    Multicast Filter State = Disabled

    802.11d State = Enabled

    Force DHCP State = Disabled

    Force DHCP Timeout = 10

    DHCP Option82 State = Disabled

    Ignore unauthorized client statistic = Disabled

    STA Info Extraction State = Enabled

    BSS Minrate = Disabled

    Call Admission Control State = Disabled

    PMK Cache Timeout= 720 minutes

    PMK Cache for Reconnect= Enabled

    NAS-ID Type= wlan-bssid

    Roaming Acct-Interim-Update= Disabled

    PAP Message Authenticator = Enabled

    Send EAP-Failure = Disabled

    L2/MAC = No ACLS

    L3/L4/IP Address = No ACLS

    L3/L4/IPv6 Address = No ACLS

    Precedence = Default

    Proxy ARP = Disabled

    Device Policy = No ACLS

    SmartRoam = Disabled Roam-factor = 5

    White List = No ACLS

    WLAN Group:

    ID:

    1:

    Name= Default

    Description= Default WLANs for Access Points

    WLAN Service:

    WLAN1:

    NAME= RuckusIntop

    VLAN=

    ruckus#