infoGlobal IG-WL5G-E Specification sheet

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
Index
1. HISTORICO ........................................................................................................ 4
2. INTRODUCCTION..............................................................................................5
3. TECHNICAL CHARACTERISTICS..................................................................... 5
4. INSTALLATION AND CONFIGURATION ......................................................... 10
5. USING THE COMMAND-LINE INTERFACE..................................................... 11
5.1 CLI Command Modes.................................................................................. 12
5.1.1 User EXEC Mode............................................................................. 13
5.1.2 Privileged EXEC Mode .................................................................... 13
5.1.3 Global Configuration Mode .............................................................. 14
5.1.4 Interface Configuration Mode........................................................... 15
5.2 Assigning an IP Address By Using the Exec................................................15
5.3 Protecting Your Wireless LAN ..................................................................... 16
5.4 Configuring Basic Security Settings............................................................. 16
5.4.1 Using VLANs....................................................................................16
5.4.2 Express Security Types...................................................................17
5.5 Workgroup Bridge Role................................................................................ 18
5.6 Configuring a System Name and Prompt..................................................... 21
5.6.1 Configuring a System Name............................................................ 21
5.7 Protecting Access to Privileged EXEC Commands ..................................... 22
5.8 Default Password and Privilege Level Configuration ................................... 22
5.9 Setting or Changing a Static Enable Password ........................................... 22
5.9.1 Protecting Enable and Enable Secret Passwords with Encryption...24
5.10 Configuring RADIUS Login Authentication.................................................26
5.11 Understanding Radio Transmit Power....................................................... 28
5.12 Configuring Radio Data Rates................................................................... 29
5.13 speed Command ....................................................................................... 30
5.14 Understanding SSIDs ................................................................................ 30
5.14.1 Creating an SSID............................................................................. 31
5.14.2 Configuring Multiple Basic SSIDs .................................................... 32

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
5.15 QoS in a Wireless Environment................................................................. 33
5.15.1 Understanding QoS for Wireless LANs............................................ 33
5.15.2 QoS for Wireless LANs Versus QoS on Wired LANs....................... 33
5.15.3 Impact of QoS on a Wireless LAN ................................................... 34
5.15.4 Precedence of QoS Settings............................................................35
5.15.5 Using Wi-Fi Multimedia Mode.......................................................... 35
5.16 Configuring VLANs .................................................................................... 36
5.16.1 Understanding VLANs ..................................................................... 36
5.16.2 Configuring a VLAN......................................................................... 38

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
1. HISTORIC
VERSION/data Modification/Description
00/27-11-2009 Creation
01/25-04-2011 Adding channel power clarification in section 5.11.
Autor: Carmen Arteaga Revisado por: Aprobado por:
Fecha: Fecha: Fecha:

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
2. INTRODUCCTION
This guide is for the professional who installs and manages the IG-WL5G-E
Onboard equipment.
To use this guide you should have experience working with network and radio
elements, be familiar with the concepts and terminology of wireless local area
networks, and be used to CLI and Linux interfaces.
3. TECHNICAL CHARACTERISTICS
HARDWARE FEATURES
Key hardware features of the Onboard 5Ghz Radio Base Station include:
Radio operation
Ethernet port
Console port
LEDs,
Power sources
Figure 1:Radio Base Station
1 Reset Led 5 Console Port

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
2 Power Led 6 Ethernet Port
3 72VDC port 7 Grounding screw
4 5GHz antenna connector
EXTERNAL INTERFACES
CONNECTOR ID
CONNECTOR
TYPE
PIN NUMBER
CABLE TYPE
SIGNAL
SIGNAL TYPE
DENOMINATION REMARK
1 +TX Positive – TX pair
2 +RX Positive – RX pair
3 -TX Negative – TX pair
Ethernet
M12-D
female
4
STP
CAT5
AWG22 -RX
Ethernet
10/100 Negative – RX pair
IP Network
connectivity
1 TX Positive – TX pair
2 RX Positive – RX pair
3 NC
Console
M12-D
female
4
No cable
needed
GND
RS232
GND
Serial
conectivity
for
maintenance
only
1 +72 72 DC signal
2 +72 72 DC signal
3 GND Ground signal
Power
M12-A
male
4
IEC Class
I* GNDl
DC
Power Ground signal
Battery
Voltage
1 Signal Signal
RF
N
female
2
LMR-400
GND
GND
RF signal
*The power cable type usually is 2x1.5 but it depends on the distance between the
power source and the equipment.
DIMENSIONS

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
PHYSICAL CHARACTERISTICS

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
Parameter Specifications
Dimensions (High x Wide x Deep) in
cm 482.6x133x253.3mm (rack 19” 3U)
Weigh (Kg) 5.7kg
High i RU’s (Rack Units) 3
Power in (Vdc) 72Vdc
Consume (W) 13W
Heat Dissipation (BTU’s / hr) 955
Operation Temperature (ºC) -20º ÷ 75º
Storage Temperature (ºC) -40º ÷ 85º
Humidity (%) 10 ÷ 90
FUNCTIONALITIES
Modes of operation
Wifi client
Wireless Network Standards and Wi-Fi Certification
IEEE 802.11a
IEEE 802.11h
IEEE 802.11d
Security:
WPA
WPA2 (802.11i)
IEEE 802.11 WEP keys of 40 bits and 128 bits

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
EAP Type(s):
EAP-Flexible Authentication via Secure Tunnelling (EAP-FAST)
Protected EAP-Generic Token Card (PEAP-GTC)
PEAP-Microsoft Challenge Authentication Protocol Version 2 (PEAP-MSCHAP)
EAP-Transport Layer Security (EAP-TLS)
EAP-Tunnelled TLS (EAP-TTLS)
EAP-Subscriber Identity Module (EAP-SIM)
Cisco LEAP
802.1X
AES,
Encryption:
AES-CCMP encryption (WPA2)
TKIP (WPA)
Cisco TKIP
WPA TKIP
IEEE 802.11 WEP keys of 40 bits and 128 bits
TCP/IP Standards
Protocols: UDP (RFC768), IP (RFC791),ICMP (RFC792), TCP (RFC793), ARP
(RFC826),
Management Standards
SNMP
USER INTERFACE
The system has the next specifications:
Physicals Interfaces:
1 Ethernet port 10/100 BaseTX with M12D connector

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
1 RS232 port with M12D connector
1 feeding interface with M12A connector
1 RF interface with N connector
Logic Interface: The system will have a user interface to configure the different
functionalities and parameters.
Serial Console, telnet or SSH v2
User interface through RS-232
Access through the Ip network
User facilities:
IP Addressing
Management Parameters SNMP
Serial parameters RS323
Logging
User/password configuration
Load/Save configuration (from TFTP)
4. INSTALLATION AND CONFIGURATION
To install this equipment it is necessary to follow the next steps:
Install the equipment in the rack with the four screws
Connect RF interface to the N-female connector
Connect the Ethernet interface to the M12D connector
Connect the power interface to the M12A connector
Connect the console cable M12D-DB9 to the series port in the computer and to the
IGWL5G-E console interface to access to the CLI interface.
Open a Hyperterminal session in the computer with the following configuration:
Bit/s:9600

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
Data Bit:8
Parity:None
Stop Bits:1
Flux Control:None
Connect the Ethernet cable to the computer Ethernet port and to the IGWL5G-E
Ethernet port.
Configure the next network parameters in the Computer
IP:10.0.0.10
Mask:255.255.255.0
If your system administrator has set a password, you are prompted to enter it
before being granted access to privileged EXEC mode. The password does not
appear on the screen and is case sensitive. The privileged EXEC mode prompt is
the device name followed by the pound sign (#):
Hostname#
Enter the enable command to access privileged EXEC mode:
Hostname> enable
Hostname#
Some supported commands can vary depending on the version of the software in
use. To view a comprehensive list of commands, enter a question mark (?) at the
prompt. AP# ?
Copy the project configuration :
Hostname#copy tftp://10.0.0.10/”configuracion.txt” startup-config
Hostname#reload
5. USING THE COMMAND-LINE INTERFACE

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
This section describes how to access the command modes and use the command-
line interface (CLI) to configure software features.
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Commands and keywords are in boldface text.
Arguments for which you supply values are in italic.
Square brackets ([ ]) means optional elements.
Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative
elements.
Braces and vertical bars within square brackets ([{ | }]) mean a required Choice
within an optional element.
5.1 CLI Command Modes
This section describes the CLI command mode structure.
These are the main command modes for access points and bridges:
•User EXEC
•Privileged EXEC
•Global configuration
•Interface configuration
Table 1-1 lists the main command modes, how to access each mode, the prompt
you see in that mode, and how to exit that mode. The prompts listed use the
default name ap.
Command Mode Access Method Prompt Exit
User EXEC This is the first level of
access.
Change terminal
settings, perform basic
tasks, and list system
information.
AP> Enter the
logout
command.

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
Privileged EXEC From user EXEC mode,
enter the enable
command.
AP# To exit to user
EXEC mode,
enter the
disable
command.
Global
configuration From privileged EXEC
mode, enter the
configure command.
AP(config)# To exit to
privileged
EXEC mode,
enter the exit or
end command,
or press Ctrl-Z.
Interface
configuration From global
configuration mode,
specify terminal then
specify an interface by
entering the interface
command followed by
the interface type and
number.
AP(config-
if)# To exit to
privileged
EXEC mode,
enter the end
command, or
press Ctrl-Z.
To exit to
global
configuration
mode, enter the
exit command.
Tabla 1Command Modes Summary
5.1.1 USER EXEC MODE
After you access the device, you are automatically in user EXEC command mode.
The EXEC commands available at the user level are a subset of those available at
the privileged level. In general, use the EXEC commands to temporarily change
terminal settings, perform basic tests, and list system information.
5.1.2 PRIVILEGED EXEC MODE
Because many of the privileged commands configure operating parameters,
privileged access should be password-protected to prevent unauthorized use. The
privileged command set includes those commands contained in user EXEC mode,

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
as well as the configure privileged EXEC command through which you access the
remaining command modes.
If your system administrator has set a password, you are prompted to enter it
before being granted access to privileged EXEC mode. The password does not
appear on the screen and is case sensitive.
The privileged EXEC mode prompt is the device name followed by the pound sign
(#):
AP#
Enter the enable command to access privileged EXEC mode:
AP> enable
AP#
To return to user EXEC mode, enter the disable privileged EXEC command.
5.1.3 GLOBAL CONFIGURATION MODE
Global configuration commands apply to features that affect the device as a whole.
Use the configure privileged EXEC command to enter global configuration mode.
The default is to enter commands from the management console.
When you enter the configure command, a message prompts you for the source of
the configuration commands:
AP# configure
Configuring from terminal, memory, or network [terminal]?
You can specify the terminal or memory as the source of configuration commands.
This example shows you how to access global configuration mode:
AP# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
AP(config)#

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
To exit global configuration command mode and to return to privileged EXEC
mode, enter the end or exit command, or press Ctrl-Z.
5.1.4 INTERFACE CONFIGURATION MODE
Interface configuration commands modify the operation of the interface. Interface
configuration commands always follow a global configuration command, which
defines the interface type.
Use the interface interface-id command to access interface configuration mode.
The new prompt means interface configuration mode:
AP(config-if)#
To exit interface configuration mode and to return to global configuration mode,
enter the exit command. To exit interface configuration mode and to return to
privileged EXEC mode, enter the end command, or press Ctrl-Z.
5.2 Assigning an IP Address By Using the Exec
The IG-WL5G-Elinks to the network by using a Bridge Group Virtual Interface (BVI)
that it creates automatically. Each IG-WL5G-Esupports one BVI.
Beginning in privileged EXEC mode, follow these steps to assign an IP address to
the BVI:
Command Purpose
Step 1 configure
terminal Enter global configuration mode.
Step 2 interface bvi1 Enter interface configuration mode for the BVI.
Step 3 ip address
address
subnetmask
Assign an IP address and subnet mask to the
BVI.
NoteIf you are connected to the IG-WL5G-
Eusing a Telnet session, the connection to the
IG-WL5G-Ewill go down when you assign a
new IP address to the BVI. To continue
configuring the IG-WL5G-Eby using Telnet, use

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
the new IP address to open another Telnet
session to the IG-WL5G/E.
5.3 Protecting Your Wireless LAN
After you assign basic settings to your IG-WL5G/E, you need to configure security
settings to prevent unauthorized access to your network. Because it is a radio
device, the IG-WL5G-E can communicate beyond the physical boundaries of a
building.
Advanced security features are described in the following chapters:
A unique SSID that is not broadcast in the beacon (see “Service Set Identifiers” for
additional information)
Wired Equivalent Privacy (WEP) and WEP features (see “Cipher Suites and WEP”)
Dynamic WEP and IG-WL5G-Eauthentication
5.4 Configuring Basic Security Settings
After you assign basic settings to your access point, you must configure security
settings to prevent unauthorized access to your network. Because it is a radio
device, the access point can communicate beyond the physical boundaries of your
worksite.
5.4.1 USING VLANS
If you use VLANs on your wireless LAN and assign SSIDs to VLANs, you can
create multiple SSIDs. However, if you do not use VLANs on your wireless LAN,
the security options that you can assign to SSIDs are limited because encryption
settings and authentication types are linked. Without VLANs, encryption settings
(WEP and ciphers) apply to an interface you cannot use more than one encryption
setting on an interface. For example, when you create an SSID with static WEP

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
with VLANs disabled, you cannot create additional SSIDs with WPA authentication
because they use different encryption settings. If you find that the security setting
for an SSID conflicts with another SSID, you can delete one or more SSIDs to
eliminate the conflict.
5.4.2 EXPRESS SECURITY TYPES
Table 1 describes the four security types that you can assign to an SSID.
Type Description Security Features
Enabled
No Security This is the least secure option. You
should use this option only for SSIDs
that are used in a public space.
Assign this option to a VLAN that
restricts access to your network.
None.
Static WEP Key This option is more secure than no
security. However, static WEP keys
are vulnerable to attack. If you
configure this setting, you should
consider limiting association to the
access point based on MAC address,
or, if your network does not have a
RADIUS server, consider using an
access point as a local authentication
server.
Mandatory WEP
encryption, no key
management, and
open authentication.

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
EAP
Authentication This option enables 802.1x extensible
authentication protocol (EAP) types,
including Lightweight EAP (LEAP),
Protected EAP (PEAP), EAP-
Transport Layer Security (EAP-TLS),
and EAP-GTC, and requires you to
enter the IP address and shared
secret for an authentication server on
your network (server authentication
port 1645). Because 802.1x
authentication provides dynamic
encryption keys, you do not need to
enter a WEP key.
Mandatory 802.1x
authentication.
WPA Wi-Fi Protected Access (WPA)
permits wireless access to users
authenticated against a database
through the services of an
authentication server, and then
encrypts their IP traffic with stronger
algorithms than those used in WEP.
As with EAP authentication, you must
enter the IP address and shared
secret for an authentication server on
your network (server authentication
port 1645).
Mandatory WPA
authentication.
5.5 Workgroup Bridge Role
The IG-WL5G-E is configured as a workgroup bridge mode to work in the train to
track Infoglobal system, the workgroup bridge associates to an access point, or
bridge as a client and provides a wireless network connection for up to eight
Ethernet-enabled devices connected to its Ethernet port.
It informs the associated root device of the attached wired clients using IAPP
messaging. The workgroup bridge does not accept wireless client associations. A
workgroup bridge:

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
Associates to the following devices:
–Root access points
-Root devices
-Accepts only wired clients.
-Informs its root parent of all attached wired clients by using Inter-Access Point
Protocol (IAPP) messaging.
In addition, you can configure the wireless device to support the following
workgroup bridge features:
•Interoperability—The universal workgroup bridge appears as a normal wireless
client to the root device.
•World Mode—In standard world mode configuration, the wireless device passively
scans for world mode only when the workgroup bridge boots up and performs a
first scan. When the workgroup bridge receives a response from the root device for
its world mode scan, it updates its frequency list and output power level according
to the current country of operation. Thereafter, the workgroup bridge always
performs an active scan. To support continued operation during inter-country travel
(such as airplane travel from New York to London), the workgroup bridge must
perform a passive scan. In this configuration, the workgroup bridge associates to
the root device, and it obtains the country-specific list of frequency and output
power levels through passive scan.To support this operational change, add the
roaming keyword to the world-mode command. This option instructs the workgroup
bridge that it must always passively scanning. The workgroup bridge uses the
802.11d option for world mode. The wireless device tries to receive information
about the country-specific list of frequency and output power levels through the
802.11d Information Element.
Note With roaming added to the world-mode command, roaming takes a longer
time; therefore, it is recommended only for situations in which it is required to
assure continuous operation.

MN-OPERATION AND INSTALLATION
MANUAL
IG-WL5G-E
R.01.2009
Multiple Client Profiles—The workgroup bridge can support multiple client profiles.
A client device with multiple configurable profiles can automatically select a client
profile based on available infrastructure and set of profiles. For more information,
see “Service Set Identifiers”.For example, to provide wireless connectivity for a
group of network printers, connect the printers to a hub or to a switch, connect the
hub or switch to the Ethernet port of the workgroup bridge. The workgroup bridge
transfers data through its association with an access point or bridge on the
network. The next Figure shows the scenario where the device functions.
The device to which a workgroup bridge associates can treat the workgroup bridge
as an infrastructure device or as a simple client device. For increased reliability, set
the infrastructure–client parameter on the access point or bridge to treat the
workgroup bridge as an infrastructure device.
When a workgroup bridge is treated as an infrastructure device, the access point
reliably delivers multicast packets, which include Address Resolution Protocol
(ARP) packets to the workgroup bridge. If an access point or bridge is configured
to treat a workgroup bridge as a client device, more workgroup bridges are allowed
to associate to the same access point or to associate with use of a service set
identifier (SSID) that is not an infrastructure SSID. The performance cost of reliable
multicast delivery—in which the duplication of each multicast packet is sent to each
workgroup bridge—limits the number of infrastructure devices (including workgroup
bridges) that can associate to an access point or bridge. To increase the number of
workgroup bridges that can associate to the access point beyond 20, the access
point must reduce the delivery reliability of multicast packets to the workgroup
bridges. With reduced reliability, the access point cannot confirm that multicast
Table of contents
Popular Accessories manuals by other brands

Byron
Byron Home Easy HE-306 installation instructions

Invacare
Invacare 710 Assembly, installation and operating instructions

IFM Electronic
IFM Electronic Efector 200 OJ5192 operating instructions

Pfeiffer Vacuum
Pfeiffer Vacuum IKT 010 operating instructions

Philips
Philips DLA71024 brochure

Waterpik
Waterpik Complete Care CC-01 quick start guide