HP a-msr User manual

HP A-MSR Router Series
WLAN
Configuration Guide
Abstract
This document describes the software features for the HP A Series products and guides you through the
software configuration procedures. These configuration guides also provide configuration examples to help
you apply software features to different network scenarios.
This documentation is intended for network planners, field technical support and servicing engineers, and
network administrators working with the HP A Series products.
Part number: 5998-2030
Software version: CMW520-R2207P02
Document version: 6PW100-20110810

Legal and notice information
© Copyright 2011 Hewlett-Packard Development Company, L.P.
No part of this documentation may be reproduced or transmitted in any form or by any means without prior
written consent of Hewlett-Packard Development Company, L.P.
The information contained herein is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for
incidental or consequential damages in connection with the furnishing, performance, or use of this material.
The only warranties for HP products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional
warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

iii
Contents
WLAN interface configuration ······································································································································· 1
WLAN-radio interface ······················································································································································1
Configuring a WLAN-radio interface ····················································································································1
WLAN-BSS interface·························································································································································1
Configuring a WLAN-BSS interface·······················································································································1
WLAN-Ethernet interface··················································································································································2
Entering WLAN-Ethernet interface view·················································································································2
Configuring a WLAN-Ethernet interface················································································································3
Displaying and maintaining a WLAN interface ············································································································8
WLAN service configuration ·········································································································································· 9
Basic concepts ··························································································································································9
Wireless client access··············································································································································9
WLAN topologies ·························································································································································· 12
Protocols and standards················································································································································ 14
Configuring WLAN service··········································································································································· 14
Configuration task list ··········································································································································· 14
Configuring global WLAN parameters ·············································································································· 14
Specifying a country code···································································································································· 14
Configuring a WLAN service template··············································································································· 15
Configuring radio parameters ····························································································································· 15
Configuring the radio of the AP ·························································································································· 16
Configuring 802.11n ··········································································································································· 17
Displaying and maintaining WLAN service······································································································· 18
Configuring WLAN client isolation······························································································································ 19
Enabling WLAN client isolation ·························································································································· 19
Configuring SSID-based access control······················································································································· 19
Specifying a permitted SSID in a user profile ···································································································· 19
WLAN service configuration examples ······················································································································· 20
WLAN service configuration example················································································································ 20
802.11n configuration example ························································································································· 21
WLAN RRM configuration ············································································································································23
Configuration task list ···················································································································································· 23
Configuring data transmit rates···································································································································· 23
Configuring 802.11b/802.11g rates················································································································ 23
Configuring 802.11n rates·································································································································· 24
Configuring non-dot11h channel scanning················································································································· 26
Enabling 802.11g protection······································································································································· 26
Displaying and maintaining WLAN RRM ··················································································································· 27
WLAN security configuration ·······································································································································28
Authentication modes ··········································································································································· 28
WLAN data security ············································································································································· 29
Client access authentication································································································································· 30
Protocols and standards ······································································································································· 30
Configuring WLAN security·········································································································································· 31
Configuration task list ··········································································································································· 31
Enabling an authentication method····················································································································· 31
Configuring the PTK lifetime································································································································· 31
Configuring the GTK rekey method····················································································································· 32

iv
Configuring security IE·········································································································································· 33
Configuring cipher suite ······································································································································· 34
Configuring port security······································································································································ 35
Displaying and maintaining WLAN security······································································································ 37
WLAN security configuration examples ······················································································································ 37
PSK authentication configuration example········································································································· 37
MAC and PSK authentication configuration example······················································································· 38
802.1X authentication configuration example ·································································································· 41
Supported combinations for ciphers ···························································································································· 46
WLAN IDS configuration ··············································································································································49
Terminology ··························································································································································· 49
WIDS attack detection·········································································································································· 49
WLAN IDS configuration task list································································································································· 50
Configuring IDS attack detection ································································································································· 50
Displaying and maintaining IDS attack detection······························································································ 51
WLAN IDS frame filtering configuration ·····················································································································52
Blacklist and white list··········································································································································· 52
Configuring WLAN IDS frame filtering························································································································ 53
Displaying and maintaining WLAN IDS frame filtering ···························································································· 54
WLAN IDS frame filtering configuration example······································································································ 54
WLAN QoS configuration ············································································································································55
Terminology ··························································································································································· 55
WMM protocol overview ····································································································································· 55
Protocols and standards ······································································································································· 57
WMM configuration······················································································································································ 57
Displaying and maintaining WMM ····························································································································· 59
WMM configuration examples ···································································································································· 59
WMM basic configuration··································································································································· 59
CAC service configuration example ··················································································································· 60
SVP service configuration example ····················································································································· 62
Troubleshooting······························································································································································ 63
EDCA parameter configuration failure ··············································································································· 63
SVP or CAC configuration failure························································································································ 63
Support and other resources ········································································································································64
Contacting HP ································································································································································ 64
Subscription service ·············································································································································· 64
Related information························································································································································ 64
Documents······························································································································································ 64
Websites ································································································································································ 64
Conventions ···································································································································································· 65
Index················································································································································································67

1
WLAN interface configuration
The terms AP and fat AP in this document refer to A-MSR900 and A-MSR20-1X routers with IEEE 802.11b/g
and A-MSR series routers installed with a SIC WLAN module.
Wireless routers support WLAN-Radio interfaces, which are physical interfaces that provide wireless network
access.
Wireless routers support WLAN-BSS and WLAN-Ethernet virtual interfaces. Use WLAN-Radio interfaces on
routers as common physical access interfaces. You can bind them to WLAN-BSS interfaces and
WLAN-Ethernet interfaces.
WLAN-radio interface
WLAN-Radio interfaces are physical interfaces used to provide wireless access service. You can configure
them, but you cannot remove them manually.
Configuring a WLAN-radio interface
To configure a WLAN-radio interface:
To do…
Use the Command…
Remarks
1. Enter system view.
system-view
—
2. Enter WLAN-radio interface
view.
interface wlan-radio
interface-number
Required.
3. Set the description for the
interface.
description text
Optional.
By default, the description string of
an interface is interface-name +
Interface.
4. Restore the default settings of
the WLAN-radio interface.
default
Optional.
5. Shut down the WLAN-radio
interface.
shutdown
Optional.
By default, a WLAN-Radio
interface is up.
WLAN-BSS interface
WLAN-BSS interfaces are virtual Layer 2 interfaces. They operate like Layer 2 Ethernet ports of the access
link type. A WLAN-BSS interface supports multiple Layer 2 protocols. On a wireless router, a WLAN-Radio
interface bound to a WLAN-BSS interface operates as a Layer 2 interface.
Configuring a WLAN-BSS interface
To configure a WLAN-BSS interface:

2
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—
2. Enter WLAN-BSS interface
view.
interface wlan-bss
interface-number
Required.
If the WLAN-BSS interface does
not exist, this command creates the
WLAN-BSS interface first.
3. Set the description string for the
interface.
description text
Optional.
By default, the description string of
an interface is interface-name +
Interface.
4. Assign the WLAN-BSS
interface to a VLAN.
port access vlan vlan-id
Optional.
By default, an interface belongs to
VLAN 1 (the default VLAN).
5. Specify an authentication
domain for MAC
authentication users.
mac-authentication domain
domain-name
Optional.
By default, the default
authentication domain is used for
MAC authentication users.
6. Set the maximum number of
concurrent MAC
authentication users on a port.
mac-authentication max-user
user-number
Optional.
256 by default
7. Restore the default settings of
the WLAN-BSS interface.
default
Optional.
8. Shut down the WLAN-BSS
interface.
shutdown
Optional.
By default, a WLAN-BSS interface
is up.
Before you execute the port access vlan command, make sure the VLAN specified by the vlan-id parameter
already exists. Use the vlan command to create a VLAN. For more information about the port access vlan
command, see Layer 2—LAN Switching Command Reference.
For more information about the mac-authentication domain and mac-authentication max-user commands,
see Security Command Reference.
WLAN-Ethernet interface
WLAN-Ethernet interfaces are virtual Layer 3 interfaces. They operate like Layer 3 Ethernet interfaces. You
can assign an IP address to a WLAN-Ethernet interface. On a wireless router, a WLAN-Radio interface
bound to a WLAN-Ethernet interface operates as a Layer 3 interface.
Entering WLAN-Ethernet interface view
To enter WLAN-Ethernet interface view:
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—

3
To do…
Use the command…
Remarks
2. Enter WLAN-Ethernet interface
view.
interface wlan-ethernet
interface-number
Required.
If the WLAN-Ethernet interface
does not exist, this command
creates the WLAN-Ethernet
interface first.
3. Restore the default settings of
the WLAN-Ethernet interface.
default
Optional.
Configuring a WLAN-Ethernet interface
For a WLAN-Ethernet interface, you can configure basic settings such as MTU, and ARP, DHCP, and routing
protocols as listed in the following table. For information about the commands/features listed in the following
table, see related chapters in the corresponding volumes.
To do…
Use the command…
1. Configure an interface.
qos max-bandwidth
shutdown
mtu
description
enable snmp trap updown
2. Configure ARP.
arp max-learning-num
arp proxy enable
proxy-arp enable
3. Configure the interface as a BOOTP client.
ip address bootp-alloc
4. Configure
DHCP.
Configure DHCP server.
dhcp select server global-pool
Configure DHCP relay.
dhcp relay address-check
dhcp relay information enable
dhcp relay information format
dhcp relay information strategy
dhcp relay release
dhcp relay server-select
dhcp select relay
Configure DHCP client.
ip address dhcp-alloc
5. Configure IP accounting.
ip count firewall-denied
ip count inbound-packets
ip count outbound-packets
6. Assign an IP address to the interface.
ip address
7. Configure IP performance.
ip forward-broadcast
tcp mss
8. Configure policy-based routing.
ip policy-based-route
9. Configure UDP helper.
udp-helper server
10. Configure URPF.
ip urpf
11. Configure fast forwarding.
ip fast-forwarding

4
To do…
Use the command…
12. Configure basic IPv6 settings.
ipv6 address
ipv6 address auto link-local
ipv6 mtu
ipv6 nd autoconfig managed-address-flag
ipv6 nd autoconfig other-flag
ipv6 nd dad attempts
ipv6 nd ns retrans-timer
ipv6 nd nud reachable-time
ipv6 nd ra halt
ipv6 nd ra interval
ipv6 nd ra prefix
ipv6 nd ra router-lifetime
ipv6 neighbors max-learning-num
ipv6 policy-based-route
13. Configure NAT-PT.
natpt enable
14. Configure IS-IS.
isis authentication-mode
isis circuit-level
isis circuit-type p2p
isis cost
isis dis-name
isis dis-priority
isis enable
isis mesh-group
isis small-hello
isis timer csnp
isis timer hello
isis timer holding-multiplier
isis timer lsp
isis timer retransmit
isis silent
15. Configure OSPF.
ospf authentication-mode simple
ospf authentication-mode
ospf cost
ospf dr-priority
ospf mtu-enable
ospf network-type
ospf timer dead
ospf timer hello
ospf timer poll
ospf timer retransmit
ospf trans-delay

5
To do…
Use the command…
16. Configure RIP.
rip authentication-mode
rip input
rip output
rip metricin
rip metricout
rip poison-reverse
rip split-horizon
rip summary-address
rip version
17. Configure IPv6 IS-IS.
isis ipv6 enable
18. Configure IPv6 OSPFv3.
ospfv3 cost
ospfv3 mtu-ignore
ospfv3 timer dead
ospfv3 timer hello
ospfv3 timer retransmit
ospfv3 area
ospfv3 dr-priority
ospfv3 trans-delay
19. Configure IPv6 RIPng.
ripng default-route
ripng enable
ripng metricin
ripng metricout
ripng poison-reverse
ripng split-horizon
ripng summary-address
20. Configure basic MPLS capabilities.
mpls
mpls ldp
mpls ldp timer hello-hold
mpls ldp timer keepalive-hold
mpls ldp transport-address
21. Configure BGP/MPLS VPN.
ip binding vpn-instance
22. Configure PPPoE.
pppoe-server bind virtual-template
pppoe-client dial-bundle-number
23. Configure bridge sets.
bridge-set
24. Configure
multicast.
Configure multicast routing and
forwarding.
multicast minimum-ttl
multicast ipv6 minimum-hoplimit
multicast boundary
multicast ipv6 boundary
Configure IPv6 multicast routing
and forwarding.
multicast ipv6 minimum-hoplimit
multicast ipv6 boundary

6
To do…
Use the command…
Configure IGMP.
igmp enable
igmp fast-leave
igmp group-policy
igmp last-member-query-interval
igmp max-response-time
igmp require-router-alert
igmp robust-count
igmp send-router-alert
igmp static-group
igmp timer other-querier-present
igmp timer query
igmp version
Configure MLD.
mld enable
mld last-listener-query-interval
mld max-response-time
mld require-router-alert
mld send-router-alert
mld robust-count
mld timer other-querier-present
mld timer query
mld version
mld static-group
mld group-policy
mld fast-leave
Configure PIM.
pim bsr-boundary
pim hello-option
pim holdtime
pim require-genid
pim sm
pim dm
pim state-refresh-capable
pim timer graft-retry
pim timer hello
pim timer join-prune
pim triggered-hello-delay

7
To do…
Use the command…
Configure IPv6 PIM.
pim ipv6 bsr-boundary
pim ipv6 hello-option
pim ipv6 holdtime
pim ipv6 require-genid
pim ipv6 sm
pim ipv6 dm
pim ipv6 state-refresh-capable
pim ipv6 timer graft-retry
pim ipv6 timer hello
pim ipv6 timer join-prune
pim ipv6 triggered-hello-delay
25. QoS
Configure traffic policing, traffic
shaping, and line rate.
qos car
qos gts any cir
qos gts acl
Apply a QoS policy.
qos apply policy
Configure congestion
avoidance.
qos max-bandwidth
26. Configure firewall.
firewall ethernet-frame-filter
firewall packet-filter
firewall packet-filter ipv6
firewall aspf
27. Configure NAT.
nat outbound
nat outbound static
nat server
28. Configure Portal.
portal auth-network
portal server
29. Configure IPsec.
ipsec policy
30. Configure the backup center.
standby interface
standby threshold
standby timer delay
standby timer flow-check
standby bandwidth
31. Configure NetStream.
ip netstream
32. Configure NTP.
ntp-service broadcast-client
ntp-service broadcast-server
ntp-service multicast-client
ntp-service multicast-server
ntp-service in-interface disable
33. Configure IPX.
ipx encapsulation

8
To do…
Use the command…
34. Configure port security.
port-security authorization ignore
port-security max-mac-count
port-security port-mode {mac-and-psk |
mac-authentication |mac-else-userlogin-secure
|mac-else-userlogin-secure-ext | psk |
userlogin-secure | userlogin-secure-ext |
userlogin-secure-ext-or-psk |
userlogin-secure-or-mac |
userlogin-secure-or-mac-ext }
port-security preshared-key { pass-phrase |
raw-key }
port-security tx-key-type 11key
Displaying and maintaining a WLAN interface
To do…
Use the command…
Remarks
Display information about
WLAN-Radio interfaces.
display interface [ wlan-radio ]
[ brief [ down ] ] [ | { begin |
exclude | include }
regular-expression ]
display interface wlan-radio
interface-number [ brief ] [ |
{ begin | exclude | include }
regular-expression ]
Available in any view
Display information about
WLAN-BSS interfaces.
display interface [ wlan-bss] [ brief
[ down ] ] [ | { begin | exclude |
include } regular-expression ]
display interface wlan-bss
interface-number [ brief ] [ |
{ begin | exclude | include }
regular-expression ]
Available in any view
Display information about
WLAN-Ethernet interfaces.
display interface [ wlan-ethernet ]
[ brief [ down ] ] [ | { begin |
exclude | include }
regular-expression ]
display interface wlan-ethernet
interface-number [ brief ] [ |
{ begin | exclude | include }
regular-expression ]
Available in any view

9
WLAN service configuration
The terms AP and fat AP in this document refer to A-MSR900 and A-MSR20-1X routers with IEEE 802.11b/g
and A-MSR series routers installed with a SIC WLAN module.
WLANs have become very popular because they are easy to set up and maintain. Generally, several APs
can cover a building or an area. Because the servers in the backbone are fixed, a WLAN is not a completely
wireless network.
The WLAN solution allows you to provide the following wireless LAN services to your customers:
WLAN client connectivity to conventional 802.3 LANs
Secured WLAN access with different authentication and encryption methods
Seamless roaming of WLAN clients in the mobility domain
Basic concepts
Client
A handheld computer or laptop with a wireless NIC can be a WLAN client.
Access point
An AP bridges frames between wireless and wired networks.
Fat AP
A fat AP controls and manages all associated wireless stations and bridges frames between wired and
wireless networks.
SSID
Service set identifier. A client scans all networks at first, and then selects a specific SSID to connect to a
specific wireless network.
Wireless medium
A medium used for transmitting frames between wireless clients. Radio frequency is used as the wireless
medium in the WLAN system.
Wireless client access
A wireless client access process involves three steps: active/passive scanning surrounding wireless services,
authentication, and association, as shown in Figure 1.

10
Figure 1 Establish a client access
Scanning
A wireless client can get the surrounding wireless network information in two ways: passive scanning or
active scanning. With passive scanning, a wireless client gets wireless network information through listening
to Beacon frames sent by surrounding APs. With active scanning, a wireless actively sends a probe request
frame during scanning, and gets network signals by received probe response frames.
Actually, when a wireless client operates, typically it uses both passive scanning and active scanning to get
information about surrounding wireless networks.
1. Active scanning
When a wireless client operates, it periodically searches for (scans) surrounding wireless networks. Active
scanning falls into two modes according to whether a specified SSID is carried in a probe request.
A client sends a probe request (with the SSID null, or, the SSID IE length is 0): The client periodically
sends a probe request frame on each of its supported channels to scan wireless networks. APs that
receive the probe request send a probe response, which carries the available wireless network
information. The client associates with the AP with the strongest signal. This active scanning mode
enables a client to actively get acquainted with the available wireless services and select to access the
proper wireless network as needed. The active scanning process of a wireless client is as shown in
Figure 2.
Figure 2 Active scanning (the SSID of the probe request is null, or, no SSID information is carried)
AP
Client
Authentication request
Authentication response
Association request
Association response
Active/Passive scanning
AP 2
Client
AP 1
Probe request (with no SSID)
Probe request (with no SSID)
Probe Response
Probe Response

11
A client sends a probe request (with a specified SSID): When the wireless client is configured to access
a specific wireless network or has already successfully accessed a wireless network, the client
periodically sends a probe request carrying the specified SSID of the configured or connected wireless
network. When an AP that can provide the wireless service with the specified SSID receives the probe
request, it sends a probe response. This active scanning mode enables a client to access a specified
wireless network. The active scanning process is as shown in Figure 3.
Figure 3 Active scanning (the probe request carries the specified SSID AP 1)
2. Passive scanning
Passive scanning is used by clients to discover surrounding wireless networks by listening to the beacon
frames periodically sent by an AP. All APs providing wireless services periodically send beacons frames, so
that wireless clients can listen to beacon frames periodically on the supported channels to get information
about surrounding wireless networks. Passive scanning is used by a client when it wants to save battery
power. Typically, VoIP clients adopt the passive scanning mode. The passive scanning process is as shown
in Figure 4.
Figure 4 Passive scanning
Authentication
To secure wireless links, the wireless clients must be authenticated before accessing the AP, and only wireless
clients passing the authentication can be associated with the AP. 802.11 links define two authentication
mechanisms: open system authentication and shared key authentication.
For more information about the two authentication mechanisms, see the chapter ―WLAN security
configuration."
Association
A client that wants to access a wireless network via an AP must be associated with that AP. Once the client
chooses a compatible network with a specified SSID and passes the link authentication to an AP, it sends an
association request frame to the AP. The AP detects the capability information carried in the association
request frame, determines the capability supported by the wireless client, and sends an association response
to the client to notify the client of the association result. Usually, a client can associate with only one AP at a
time, and an association process is always initiated by the client.
Client AP 1
(SSID=AP1)
Probe Request
(SSID=AP1)
Probe Response
AP
Client
Beacon
Client
Beacon

12
Other related procedures
1. De-authentication
A de-authentication frame can be sent by either an AP or wireless client to break an existing link. In a wireless
system, de-authentication can occur due to many reasons, such as:
Receiving an association/disassociation frame from a client which is unauthenticated.
Receiving a data frame from a client which is unauthenticated.
Receiving a PS-poll frame from a client which is unauthenticated.
2. Dissociation
A dissociation frame can be sent by an AP or a wireless client to break the current wireless link. In the wireless
system, dissociation can occur due to many reasons, such as:
Receiving a data frame from a client which is authenticated and unassociated.
Receiving a PS-Poll frame from a client which is authenticated and unassociated.
WLAN topologies
WLAN topologies for fat APs consist of:
Single BSS
Multi-ESS
Single ESS Multi-BSS
Single BSS
The coverage of an AP is a BSS. Each BSS is identified by a BSSID. The most basic WLAN network can be
established with only one BSS. All wireless clients associate with the same BSS. If these clients have the same
authorization, they can communicate with each other. Figure 5 shows a single BSS network.
Figure 5 Single BSS network
The clients can communicate with each other or reach a host in the Internet. Communications between clients
within the same BSS are carried out through the fat AP.
FAT AP
Gateway
Client1 Client 2
BSS
Internet

13
Multi-ESS
This topology describes a scenario where more than one ESS exists. When a mobile client joins the fat AP,
it can join one of the available ESSs. Figure 6 shows a multi-ESS network.
Figure 6 Multi-ESS network
Generally a fat AP can provide more than one logical ESS at the same time. The fat AP can broadcast the
current information of ESS by beacon or probe response frames. Clients can select an ESS it is interested to
join.
Different ESS domains can be configured on the fat AP. The fat AP can be configured to accept clients in
these ESS domains once their credentials are acceptable.
Single ESS Multi-BSS (the multi-radio case)
This topology describes a scenario where a fat AP has two radios that are in the same ESS but belong to
different BSSs.
Figure 7 Single ESS multiple BSS network
Use this network scenario when both 802.11a and 802.11b/g need to be supported. Figure 7 shows two
clients connected to different radios belong to the same ESS but different BSSs.
FAT AP
Gateway
Client1 Client 2
Internet
ESS 1 ESS 2
FAT AP
Gateway
Client 2
Internet
Radio 2
Radio 1
Client 1
ESS 1
ESS 1
BSS 2
BSS 1

14
Protocols and standards
ANSI/IEEE Std 802.11, 1999 Edition
IEEE Std 802.11a
IEEE Std 802.11b
IEEE Std 802.11g
IEEE Std 802.11i
IEEE Std 802.11-2004
IEEE Std 802.11n
Configuring WLAN service
Configuration task list
Task
Description
Configuring global WLAN parameters
Optional
Specifying a country code
Required
Configuring a WLAN service template
Required
Configuring radio parameters
Required
Configuring the radio of the AP
Required
Configuring 802.11n
Optional
Configuring global WLAN parameters
To configure global WLAN parameters:
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—
2. Configure the client idle
timeout interval.
wlan client idle-timeout interval
Optional.
By default, the idle timeout interval
is 3600 seconds.
3. Configure the client keep alive
interval.
wlan client keep-alive interval
Optional.
By default, keep–alive function is
disabled.
4. Enable the fat AP to respond
to the probe requests with the
SSID null sent by the client.
wlan broadcast–probe reply
Optional.
Enabled by default.
Specifying a country code
A country code identifies the country in which you want to operate radios. It determines characteristics such
as operating power level and total number of channels available for the transmission of frames. You must set
the valid country code or area code before configuring an AP.

15
To specify the country code:
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—
2. Specify the country code.
wlan country-code code
By default, the country code for
North American models is US, and
for other models is CN.
You cannot modify the country code for North American models. Country codes for other models can be
modified at the CLI.
For information about country codes, see WLAN Command Reference.
Configuring a WLAN service template
A WLAN service template includes attributes such as SSID and authentication method (open-system or
shared key) information. A service template can be of clear or crypto type. If a clear type service template
exists, you cannot change it to crypto. To do so, you must delete the clear type service template, and
configure a new service template with type as crypto.
To configure a service template:
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—
2. Create a WLAN service
template and enter WLAN
service template view.
wlan service-template
service-template-number { clear |
crypto }
Required.
3. Specify the service set
identifier.
ssid ssid-name
Required.
By default, no SSID is set.
4. Hide the SSID in beacon
frames.
beacon ssid-hide
Optional.
By default the SSID is not hidden
in beacon frames.
5. Specify an authentication
method.
authentication-method {open system
|shared key }
Required.
For related configuration about
the shared key, see the chapter
―WLAN security configuration."
6. Specify the maximum number
of clients allowed to associate
with the same radio.
client max-count max-number
Optional.
32 by default.
7. Enable the service template.
service-template enable
Required.
Disabled by default.
Configuring radio parameters
To configure the radio of the AP:
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—

16
To do…
Use the command…
Remarks
2. Enter radio interface view.
interface wlan-radio
interface-number
—
3. Specify a radio type for the
radio.
radio-type [ type { dot11b | dot11g |
dot11gn } ]
Required.
4. Bind a service template to a
WLAN-ESS interface for the
radio.
service-template
service-template-number interface
wlan-bss interface-number
Required.
5. Specify a working channel for
the radio.
channel { channel-number | auto }
Optional.
By default, auto mode is enabled.
The working channel of a radio
varies with country codes and
radio types. The channel list
depends on your device model.
6. Specify the maximum radio
power.
max-power radio-power
Optional.
By default, the maximum radio
power varies with country codes,
channels, AP models, radio types
and antenna types. If 802.11n is
adopted, the maximum radio
power also depends on the
bandwidth mode.
7. Specify the type of preamble.
preamble { long | short }
Optional.
By default, the short preamble is
supported.
This command does not apply to
802.11a radios.
Configuring the radio of the AP
To configure the radio of the AP:
To do…
Use the command…
Remarks
1. Enter system view.
system-view
—
2. Enter radio view.
interface wlan-radio radio-number
Required.
3. Set the interval for sending
beacon frames.
beacon-interval interval
Optional.
By default, the beacon interval is
100 TUs.
4. Set the DTIM counter for
beacon frames.
dtim counter
Optional.
By default, the DTIM counter is 1.
5. Set the fragment threshold.
fragment-threshold size
Optional.
By default, the fragment threshold
is 2346 bytes and must be an
even number.
Table of contents
Other HP Network Router manuals

HP
HP StorageWorks M2402 User manual

HP
HP ProCurve Secure 7102dl User manual

HP
HP 10500 series User manual

HP
HP StorageWorks MPX200 User instructions

HP
HP ProCurve MSM317 User manual

HP
HP MSR ASM User manual

HP
HP FlexNetwork HSR6800 User manual

HP
HP Series 200 User manual

HP
HP Series 200 User guide

HP
HP FlexNetwork HSR6600 Installation manual
Popular Network Router manuals by other brands

Linksys
Linksys Instant PowerLine PLEBR10 Brochure & specs

Rane
Rane MONGOOSE installation manual

DEC
DEC DECserver 200 Hardware installation

NETGEAR
NETGEAR MR814 - 802.11b Cable/DSL Wireless Router installation guide

Iskratel
Iskratel SI2000 Ganymede 822+ user guide

Billion
Billion BiPAC 8700VAX(L)-1600 user manual