Foundry Networks IronPoint 200 User manual

Foundry IronPoint™ 200
User Guide
Release 02.1.00
4980 Great America Parkway
Santa Clara, CA 95054
Tel 408.207.1700
www.foundrynetworks.com
December 2006

Copyright © 2006 Foundry Networks, Inc. All rights reserved.
No part of this work may be reproduced in any form or by any means – graphic, electronic or
mechanical, including photocopying, recording, taping or storage in an information retrieval system –
without prior written permission of the copyright owner.
The trademarks, logos and service marks ("Marks") displayed herein are the property of Foundry or
other third parties. You are not permitted to use these Marks without the prior written consent of
Foundry or such appropriate third party.
Foundry Networks, BigIron, FastIron, IronView, JetCore, NetIron, ServerIron, TurboIron, IronWare, EdgeIron,
IronPoint, the Iron family of marks and the Foundry Logo are trademarks or registered trademarks of
Foundry Networks, Inc. in the United States and other countries.
All other trademarks mentioned in this document are the property of their respective owners.

December 2006 © 2006 Foundry Networks, Inc. iii
Contents
Chapter 1.
About This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Nomenclature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
How to Get Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Foundry Networks Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1
Web Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
E-mail Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Telephone Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Warranty Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Summary of Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
Technical Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-2
List of Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-3
What’s New in This Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5
Release 02.1.09 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5
Release 02.1.00 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-5
Chapter 2.
Initial Configuration and Software Upgrades . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-1
Initially Configuring an Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-1
Using ADC to Configure An Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-1
Configuring an Access Point when ADC is not Used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Required Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-2
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Setting the IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Setting the Country Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-3
Setting Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4

Foundry IronPoint 200 User Guide
iv © 2006 Foundry Networks, Inc. December 2006
Enabling SNMP Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-5
Trap Receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6
System Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-6
Chapter 3.
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1
Accessing the Web Browser Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1
Navigating the Web Browser Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-2
Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3
Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-3
Chapter 4.
Using the Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Using the Command Line Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Accessing the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Console Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Telnet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-1
Entering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Keywords and Arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Minimum Abbreviation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Command Completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Getting Help on Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Partial Keyword Lookup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Negating the Effect of Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Using Command History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Understanding Command Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-4
Exec Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
Command Line Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
Chapter 5.
Complete List of CLI Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-1
Command Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-1
General System Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2
IP Configuration Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
Management Access Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
System Information Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
System Identification Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4
System Logging Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4
System Clock Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4
SNMP Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-4
Flash/File Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-5

Contents
December 2006 © 2006 Foundry Networks, Inc. v
RADIUS Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-6
MAC Address Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-6
802.1x Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-7
Intrusion Detection and Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-7
Bridging and Traffic Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8
Ethernet Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8
Management Tunnel (PPPoE) Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-8
Radio Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9
Wireless Security Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-10
VLAN Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-11
QoS Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-11
Chapter 6.
General System and CLI Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1
Using the General System Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-1
Enabling and Disabling ADC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-8
Support for IronPoint Wireless Location Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-9
Chapter 7.
Flash and File Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-5
Viewing and Editing XML Configuration files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-7
Chapter 8.
Configuring IP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-4
Chapter 9.
Management Access Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-1
Configuring User Names and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-2
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-3
Telnet and SSH Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-4
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-5
Configuring the Web Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-6
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-6
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-8
Using ACLs to Control Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-9
Configuring Banners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9-13
Chapter 10.

Foundry IronPoint 200 User Guide
vi © 2006 Foundry Networks, Inc. December 2006
SNMP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1
Enabling SNMP and Setting v1 and v2c Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-6
Configuring SNMPv3 Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-9
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-9
Configuring SNMPv3 Trap Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-12
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-12
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-14
Configuring SNMPv3 Notification Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-15
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-16
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-17
Chapter 11.
System Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-2
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11-3
Chapter 12.
System Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1
Enabling System Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-5
Displaying Log Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-5
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-6
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12-6
Chapter 13.
System Clock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13-4
Chapter 14.
Management Tunnel Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-6
Chapter 15.
RADIUS Client Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-6
Chapter 16.
Intrusion Detection and Lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16-2

Contents
December 2006 © 2006 Foundry Networks, Inc. vii
Chapter 17.
Bridging and Traffic Filter Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17-6
Chapter 18.
Wireless Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-1
Configuring MAC Address Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-2
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-2
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-5
Configuring 802.1x Client Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-6
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-7
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-8
Configuring 802.1x Supplicant Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-10
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-10
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18-11
Chapter 19.
Ethernet Interface Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19-3
Chapter 20.
Radio Interface Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-1
Configuring Radio Settings (802.11a) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-2
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-14
Configuring Radio Settings (802.11g) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-18
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-18
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-21
Configuring Access Point Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20-23
Chapter 21.
Wireless Security Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-1
Configuring Static WEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-6
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-6
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-10
Configuring WPA or WPA2 Pre-Shared Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-13
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-13
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-15
Configuring WPA and WPA2 over 802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-16
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-16
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-18
Web Management Interface Advanced Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-20

Foundry IronPoint 200 User Guide
viii © 2006 Foundry Networks, Inc. December 2006
Changing Encryption Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21-23
Chapter 22.
VLAN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-1
Enabling VLAN Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-2
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-2
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-3
Setting Default VLAN IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-4
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-4
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22-5
Chapter 23.
System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-1
Displaying the Access Point Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-1
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-1
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-3
Displaying Wireless Client Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-5
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-5
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-6
Displaying the AP Inventory Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-7
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23-7
Chapter 24.
QoS Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-1
Enabling QoS Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-2
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-2
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-4
Enabling SVP Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-6
Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-6
Using the Web Management Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24-7
Appendix A.
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Appendix B.
Syslog Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
General System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1
802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2
MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2
Radio Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-3
Radio Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-5
Wireless Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-8
Access Point Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-10
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-10
Syslog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-11

Contents
December 2006 © 2006 Foundry Networks, Inc. ix
DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-11
Appendix C.
Country Channel Allocations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Channel Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Channel Settings by Country . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Appendix D.
Pin Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1
Console Port Pin Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1
Wiring Map for Serial Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1
Glossary
Index

Foundry IronPoint 200 User Guide
x © 2006 Foundry Networks, Inc. December 2006

December 2006 © 2006 Foundry Networks, Inc. 1-1
Chapter 1
About This Guide
The IronPoint™ 200 Access Point is a device that allows wireless clients to connect to your
enterprise network. It is a full-featured access point that can be managed as a single device or by
IronView Network Manager, a network management tool that manages several Foundry devices on
a network.
This guide presents the procedures configuring and managing an IronPoint™ 200 Access Point
using its command line interface and its Web interface.
Audience
This guide is for system administrators with a working knowledge of network management.
You should be familiar with switching and networking concepts.
Nomenclature
This guide uses the following typographical conventions to show information:
Monospace font – Enter text exactly as it appears in this guide.
bold font – Identifies a command line interface command when it is used in a sentence or paragraph.
<italics> – Words in italics inside a parenthesis indicate a value to be entered.
Note: emphasizes an important fact or calls your attention to a dependency.
How to Get Help
If you need assistance, Foundry Networks is committed to ensuring that your investment in our
products remains cost-effective by offering a variety of support options.
Foundry Networks Technical Support
Foundry Networks technical support will ensure that the fast and easy access that you have come to
expect from your Foundry Networks products will be maintained.

Foundry IronPoint 200 User Guide
1-2 © 2006 Foundry Networks, Inc. December 2006
Web Access
Point your browser to the following URL: http://www.foundrynetworks.com.
Navigate to Services/Technical Support.
Click the Login button, then enter your user name and password to gain access to the Foundry
support site.
E-mail Access
Telephone Access
◆1.877.TURBOCALL (887.2622): United States
◆1.408.586.1881: Outside the United States
Warranty Coverage
Contact Foundry Networks using any of the methods listed above for information about the standard
and extended warranties.
Related Publications
Refer to the Foundry IronPoint 200 Installation Guide for instructions on how to install the access
point.
Summary of Features
This manual contains the configuration and management commands for the IronPoint 200 Access
Point. It provides information for features in the following software version:
◆Software release version 02.1.00 and later.
Technical Specifications
The following table summarizes the technical specifications for the access point:
Properties IronPoint 200
10/100 Base-T Ports 1
Wireless interfaces 802.11a
802.11b/g
Maximum clients 64 per VAP interface
Flash memory 8 MB
DRAM 32 MB
Physical Dimensions (HxWxD) 1.29"x8.6"x5.4" (3.27x21.83x13.73 cm)
Weight 1.76 lbs (0.8 kg)
Power Consumption (Watt) 13.2 W maximum

About This Guide
December 2006 © 2006 Foundry Networks, Inc. 1-3
List of Features
The following table summarizes the features available in the access point. Refer to the appropriate
sections in this manual for any feature limitations.
Category Feature IronPoint 200
IP Address Management Automatic Discovery and
Configuration (ADC)
Yes
Static Yes
DHCP client Yes
DNS resolution Yes
VLAN 802.1Q tagging Yes
64 VLAN IDs Yes
Management VLAN ID Yes
Native VLAN ID per radio Yes
802.1X dynamic VLAN assignments Yes
System Software Dual firmware image Yes
TFTP upgrade Yes
FTP upgrade Yes
HTTP upgrade Yes
SNMP SNMP v1 and v2c Yes
SNMPv3 users Yes
SNMPv3 groups Yes
SNMPv3 trap targets Yes
SNMPv3 trap filters Yes
Management Access Console CLI Yes
HTTP Yes
HTTPS Yes
Telnet Yes
SSH v2.0 Yes
PPPoE Management Tunnel Yes
ACLs to filter HTTP, HTTPS, Telnet,
and SNMP access
Yes
Banners Yes
Logging Event Logging Yes
Remote Syslog (4 servers) Yes
Console display and clear Yes
Web display and clear Yes

Foundry IronPoint 200 User Guide
1-4 © 2006 Foundry Networks, Inc. December 2006
System Clock SNTP client Yes
Manual date and time setting Yes
Time zone Yes
Daylight saving Yes
Bridge Filters Wireless to wireless Yes
Ethernet protocols Yes
Management from wireless Yes
Authentication Management user name & password Yes
802.1x supplicant Yes
RADIUS Accounting Yes
Intrusion Detection and Lockout Yes
Status Information System configuration Yes
Wireless configuration Yes
Wireless client status Yes
QoS IEEE 802.1p Yes
Source/Destination MAC address Yes
Ethernet protocol type Yes
SpectraLink Voice Priority (SVP) Yes
Radio Settings Country Code setting Yes
External antenna Yes
Auto channel selection Yes
Selectable mode operation Yes
Selectable power setting Yes
Data rate setting Yes
Selectable beacon interval Yes
Selectable DTIM interval Yes
Adjustable RTS threshold Yes
Adjustable fragmentation threshold Yes
Maximum clients setting (64) Yes
802.11a Turbo mode Yes
IAPP support Yes
Load Balance Yes, beginning with release 02.1.00
Category Feature IronPoint 200

About This Guide
December 2006 © 2006 Foundry Networks, Inc. 1-5
What’s New in This Release
The following table summarizes the features and changes that are new in software release version
02.1.xx.
Release 02.1.09
Release 02.1.00
Wireless Security Virtual access points per radio (4) Yes
Hidden SSID Yes
RADIUS MAC authentication Yes
Local MAC authentication Yes
802.1x client authentication Yes
WEP authentication Yes
WEP encryption (64, 128, 152 bit) Yes
Dynamic WEP keys with 802.1x Yes
WPA and WPA2 over 802.1x Yes
WPA and WPA2 Pre-shared Key Yes
WPA-WPA2 Mixed Mode Yes
WPA2 Pre-authentication Yes
TKIP encryption Yes
AES-CCMP encryption Yes
Enhancement Description See Page
Support for IronPoint Wireless
Location Manager
If you are using IronPoint Wireless Location Manager,
configure the inline-scanning command fo scan for and
report neighbor access points.
6-9
Enhancement Description See Page
Automatic channel selection You can configure access points to automatically select a
channel and transmission power for its radios
20-5 and 20-19
Displaying neighbor
information
The show neighbor-ap report displays the broadcast SSIDs
of the neighbor access points, the channels they are using,
and the strength of the signal of the channel.
20-14
Ability to configure up to 32
user accounts
You can now configure up to 16 Admin user accounts and up
to 16 Read-Only user accounts
9-1
Category Feature IronPoint 200

Foundry IronPoint 200 User Guide
1-6 © 2006 Foundry Networks, Inc. December 2006
Support for fully qualified DNS
domain names for remote
servers
You can use fully qualified DNS domain names instead of
their IP addresses for remote servers such as SNMP, SNTP,
Syslog and RADIUS servers. You can enter up to 255
characters for DNS domain names
SNMP: 10-4
SNTP: 13-3
Syslog: 12-3
RADIUS: 15-2
Support for readable text
configuration files
Access point configuration files can be saved to a readable
XML format, which can be exported to an FTP or TFTP
server and viewed with an XML editor.
7-1
Added support for QoS
controls and SVP
QoS support on the IP 200 access points allows you to map
data packets received on an interface can be mapped to
IEEE 802.1p priority levels. Mapping is based on the source
or destination MAC address, or the Ethernet protocol type.
24-1
Added support for SVP The access point provides support for SpectraLink Voice
Priority (SVP), a QoS mechanism for priortizing Voice over
Internet Protocol (VoIP) traffic in wireless LANs.
24-6
Modified security configuration
and added support for WPA2
The Wi-Fi Protected Access 2 (WPA2) security method is
now supported on the IP 200 access point.
20-1 and 21-1
Load Balancing Wireless clients are associated with the access point closes
to their location to help balance the load on each access
point.
20-23
Enhancement Description See Page

December 2006 © 2006 Foundry Networks, Inc. 2-1
Chapter 2
Initial Configuration and Software Upgrades
Foundry’s IronPoint 200 access point can be configured using the automatic discovery and
configuration (ADC) feature or by manually defining each feature on an access point. The method
you choose determines which procedure you need to use to configure or upgrade your access
points.
ADC allows you to rapidly configure a number of access points, straight out of the box, by mapping
an access point’s MAC address to an IP address, subnet mask, and default gateway. This
information is mapped on an IronPoint-FES interface. Once the access point is attached to the
IronPoint-FES, the switch assigns the predefined IP address, subnet mask, and default gateway to
the access point with the matching MAC address.
Foundry’s IronView Network Manager, an SNMP-based network management software application,
allows the access point and the IronPoint-FES to be automatically discovered and configured by
IronView Network Manager. Configuration definitions can be created in IronView Network Manager,
then deployed to IronPoint-FES. Configuration definitions are then downloaded to the access points
connected to an IronPoint-FES interface.
This chapter contains the following sections:
• “Initially Configuring an Access Point” allows you to choose one of the following methods to
configure access points:
• “Using ADC to Configure An Access Point”
• “Configuring an Access Point when ADC is not Used”
• “System Defaults”
Initially Configuring an Access Point
Before configuring a new access point, determine if you want to use ADC or not use ADC.
Using ADC to Configure An Access Point
If you will be using ADC to configure an access point, refer to the documentation for the IronView
Network Manager or the Foundry IronPoint Wireless LAN Configuration Guide to determine how to
use ADC to configure the access point.

Foundry IronPoint 200 User Guide
2-2 © 2006 Foundry Networks, Inc. December 2006
NOTE: Access points can be converted to a sensor, as discussed in the release notes for the RF Monitoring
sensor. Sensors can also be configured using ADC; however, there may be a five minute delay before the state
change to a sensor due to ADC is displayed in show commands.
Configuring an Access Point when ADC is not Used
If you are not using ADC to configure an access point, follow the procedures presented in the
sections below. You can manually configure an access point, by using one of the following methods:
• A command line interface (CLI) that can be accessed through a direct connection to the access
point’s console port.
• A Web-browser interface that can be used through a network connection.
• Simple Network Management Protocol (SNMP) software that can be used through a network
connection.
Required Connections
The IronPoint 200 provides an RS-232 console port that enables a connection to a PC or terminal for
monitoring and configuration. Attach a VT100-compatible terminal, or a PC running a terminal
emulation program to the access point. You can use the console cable provided with this package, or
use a cable that complies with the wiring assignments shown in “Console Port Pin Assignments” on
page D-1.
To connect to the console port, complete the following steps:
1. Connect the console cable to the serial port on a terminal, or a PC running terminal emulation
software, and tighten the captive retaining screws on the DB-9 connector.
2. Connect the other end of the cable to the RS-232 serial port on the access point.
3. Make sure the terminal emulation software is set as follows:
• Select the appropriate serial port (COM port 1 or 2).
• Set the data rate to 9600 baud.
• Set the data format to 8 data bits, 1 stop bit, and no parity.
• Set flow control to none.
• Set the emulation mode to VT100.
• When using HyperTerminal, select Terminal keys, not Windows keys.
Note: When using HyperTerminal with Microsoft®Windows®2000, make sure that you have
Windows 2000 Service Pack 2 or later installed. Windows 2000 Service Pack 2 fixes the problem of
arrow keys not functioning in HyperTerminal’s VT100 emulation. See www.microsoft.com for
information on Windows 2000 service packs.
4. Once you have set up the terminal correctly, press the [Enter] key to initiate the console
connection. The console login screen displays.

Initial Configuration and Software Upgrades
December 2006 © 2006 Foundry Networks, Inc. 2-3
For a description of how to use the CLI, see “Using the Command Line Interface” on page 4-1. For a
list of all the CLI commands and detailed information on using the CLI, refer to “Command Groups”
on page 5-1.
Logging In
Enter “admin” for the user name. Type the default password "admin" and press [Enter] at the
password prompt. The CLI prompt appears as shown below.
Setting the IP Address
The access point has a default IP address of 169.254.1.1, which may not be compatible with your
network. You will therefore have to use the CLI to assign a compatible IP address or configure the
access point to obtain its IP settings from a DHCP server.
Type “configure” to enter configuration mode, then type “interface ethernet” to access the Ethernet
interface-configuration mode.
Type “ip address ip-address netmask gateway,” where “ip-address” is the access point’s IP address,
“netmask” is the network mask for the network, and “gateway” is the default gateway router. Check
with your system administrator to obtain an IP address that is compatible with your network.
Alternatively, to configure the access point to obtain its IP settings from a DHCP server, type “ip
dhcp."
After configuring the access point’s IP parameters, you can access the management interface from
anywhere within the attached network. The command line interface can also be accessed using
Telnet from any computer attached to the network.
Setting the Country Code
If your access point is configured by default without a country code (that is, set to "99"). You must use
the CLI to set the country code. Setting the country code restricts operation of the access point to
the radio channels permitted for wireless networks in the specified country.
Username: admin
Password:
Foundry AP#
Foundry AP#configure
Foundry AP(config)#interface ethernet
Foundry AP(config-if)#
Foundry AP(if-ethernet)#ip address 192.168.2.2 255.255.255.0 192.168.2.254
Foundry AP(if-ethernet)#
Foundry AP(if-ethernet)#ip dhcp
Foundry AP(if-ethernet)#

Foundry IronPoint 200 User Guide
2-4 © 2006 Foundry Networks, Inc. December 2006
Note: After using the CLI to set the country code, the 802.11a and 802.11g radio interfaces are still
disabled. You must enable the radios using the CLI or Web interface for wireless operation.
Note: Country regulations for wireless products differ from country to country. The access points
may be shipped with the country code already preset, as required by the country, or set to the
default setting of "99". If your country code is pre-set (for example, for United States, Canada,
Japan, and New Zealand), it is prohibited for you to change this setting. If country code on your
access point is set to "99", then you may set the country code, but you can set it only to the country
in which the access point is to be used.
It is very important to follow these instructions carefully. Selection of the wrong country code for your
device could result in the device operating outside of authorized frequency/power allocations and
lead to possible legal action by the regulatory authority in your country
Although Foundry has attempted to provide accurate information in these materials, Foundry
assumes no legal responsibility for the accuracy or completeness of the information. Please note
that Foundry's product information does not constitute or contain any guarantee, warranty or legally
binding representation, unless expressly identified as such in a duly signed writing.
Type “exit” to leave configuration mode. Then type “country ?” to display the list of countries. Select
the code for your country and enter the country command again, followed by your country code (for
example, GB for United Kingdom).
Setting Passwords
Management access to the access point’s CLI or Web interface is controlled through user names
and passwords. Each user name has an associated access level; either Admin or Read-Only. A
Foundry AP#country ?
WORD Country code: AL-ALBANIA, DZ-ALGERIA, AR-ARGENTINA, AM-ARMENIA,
AU-AUSTRALIA, AT-AUSTRIA, AZ-AZERBAIJAN, BH-BAHRAIN, BY-BELARUS,
BE-BELGIUM, BZ-BELIZE, BO-BOLVIA, BR-BRAZIL, BN-BRUNEI_DARUSSALAM,
BG-BULGARIA, CA-CANADA, CL-CHILE, CN-CHINA, CO-COLOMBIA, CR-COSTA_RICA,
HR-CROATIA, CY-CYPRUS, CZ-CZECH_REPUBLIC, DK-DENMARK,
DO-DOMINICAN_REPUBLIC, EC-ECUADOR, EG-EGYPT, EE-ESTONIA, FI-FINLAND,
FR-FRANCE, GE-GEORGIA, DE-GERMANY, GR-GREECE, GT-GUATEMALA,
HK-HONG_KONG, HU-HUNGARY, IS-ICELAND, IN-INDIA, ID-INDONESIA, IR-IRAN,
IE-IRELAND, IL-ISRAEL, IT-ITALY, JP-JAPAN, JO-JORDAN, KZ-KAZAKHSTAN,
KP-NORTH KOREA, KR-KOREA_REPUBLIC, KW-KUWAIT, LV-LATVIA, LB-LEBANON,
LI-LIECHTENSTEIN, LT-LITHUANIA, LU-LUXEMBOURG, MO-MACAU, MK-MACEDONIA,
MY-MALAYSIA, MX-MEXICO, MC-MONACO, MA-MOROCCO, NL-NETHERLANDS,
NZ-NEW_ZEALAND, NO-NORWAY, OM-OMAN, PK-PAKISTAN, PA-PANAMA, PE-PERU,
PH-PHILIPPINES, PL-POLAND, PT-PORTUGAL, PR-PUERTO_RICO, QA-QATAR,
RO-ROMANIA, RU-RUSSIA, SA-SAUDI_ARABIA, SG-SINGAPORE,
SK-SLOVAK_REPUBLIC, SI-SLOVENIA, ZA-SOUTH_AFRICA, ES-SPAIN, SE-SWEDEN,
CH-SWITZERLAND, SY-SYRIA, TW-TAIWAN, TH-THAILAND, TR-TURKEY,
UA-UKRAINE, AE-UNITED_ARAB_EMIRATES, GB-UNITED_KINGDOM,
US-UNITED_STATES, UY-URUGUAY, VE-VENEZUELA, VN-VIETNAM
Foundry AP#country gb
Foundry AP#
Other manuals for IronPoint 200
1
Table of contents
Other Foundry Networks Wireless Access Point manuals
Popular Wireless Access Point manuals by other brands

Atlantis
Atlantis NetFly AP4 W300N+ quick start guide

SurePoint
SurePoint 396-3272Y1 installation manual

Grandstream Networks
Grandstream Networks GWN7624 Quick installation guide

Athom
Athom HOMEY-BRIDGE 01 Series Handling manual

Ubiquiti
Ubiquiti Rocket5ac PtP quick start guide

Cisco
Cisco Catalyst IW9165E quick start guide