Home | Register Login | Wanted Manuals | MarketPlace | Members Area | Manuals Manufacturer Directory | UPC Lookup | Information Pages | Policy


Back To 3Com Networking Related       Model: 3CRWE675075 11A/G WORK GROUP BRIDGE
Regular Text Search or Search by Model Number

Register / log-in to add to your Hammerwall Collection.
Manual Location


This is a partial text extraction from the pdf, to download the pdf, click the Manual tab. If you want to search this text, hold control and F, and type the word you are looking for.

Page: 1

11a / b / g Wireless Workgroup Bridge User Guide Model : WL - 560 3CRWE675075 http : / / www . 3com.com / Part No . DUA6750 - 75AAA03 Published August 2005
Page: 2

3Com Corporation Copyright © 2004 - 2005 , 3Com Corporation . All rights reserved . No part of this documentation may be reproduced in any form or by any means or used to make any derivative work ( such as translation , 350 Campus Drive transformation , or adaptation ) without written permission from 3Com Corporation . Marlborough 3Com Corporation reserves the right to revise this documentation and to make changes in content from time MA USA 01752 - 3064 to time without obligation on the part of 3Com Corporation to provide notification of such revision or change . 3Com Corporation provides this documentation without warranty , term , or condition of any kind , either implied or expressed , including , but not limited to , the implied warranties , terms or conditions of merchantability , satisfactory quality , and fitness for a particular purpose . 3Com may make improvements or changes in the product ( s ) and / or the program ( s ) described in this documentation at any time . If there is any software on removable media described in this documentation , it is furnished under a license agreement included with the product as a separate document , in the hard copy documentation , or on the removable media in a directory file named LICENSE.TXT or ! LICENSE.TXT . If you are unable to locate a copy , please contact 3Com and a copy will be provided to you . UNITED STATES GOVERNMENT LEGEND If you are a United States government agency , then this documentation and the software described herein are provided to you subject to the following : All technical data and computer software are commercial in nature and developed solely at private expense . Software is delivered as “ Commercial Computer Software ” as defined in DFARS 252.227 - 7014 ( June 1995 ) or 2.101 ( a ) and as such is provided with only such rights as are as a “ commercial item ” as defined in FAR provided in 3Com’s standard commercial license for the Software . Technical data is provided with limited 1995 ) or FAR 52.227 - 14 ( June 1987 ) , whichever is rights only as provided in DFAR 252.227 - 7015 ( Nov applicable . You agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in , or delivered to you in conjunction with , this User Guide . Unless otherwise indicated , 3Com registered trademarks are registered in the United States and may or may not be registered in other countries . 3Com and the 3Com logo are registered trademarks of 3Com Corporation . Intel and Pentium are registered trademarks of Intel Corporation . Microsoft , MS - DOS , Windows , and Windows NT are registered trademarks of Microsoft Corporation . Novell and NetWare are registered trademarks of Novell , Inc . UNIX is a registered trademark in the United States and other countries , licensed exclusively through X / Open Company , Ltd . IEEE and 802 are registered trademarks of the Institute of Electrical and Electronics Engineers , Inc . All other company and product names may be trademarks of the respective companies with which they are associated . ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally - friendly in all operations . To uphold our policy , we are committed to : Establishing environmental performance standards that comply with national legislation and regulations . Conserving energy , materials and natural resources in all operations . Reducing the waste generated by all operations . Ensuring that all waste conforms to recognized environmental standards . Maximizing the recyclable and reusable content of all products . Ensuring that all products can be recycled , reused and disposed of safely . Ensuring that all products are labelled according to recognized environmental standards . Improving our environmental record on a continual basis . End of Life Statement 3Com processes allow for the recovery , reclamation and safe disposal of all end - of - life electronic components . Regulated Materials Statement 3Com products do not contain any hazardous or ozone - depleting material . Environmental Statement about the Documentation The documentation for this product is printed on paper that comes from sustainable , managed forests ; it is fully biodegradable and recyclable , and is completely chlorine - free . The varnish is environmentally - friendly , and the inks are vegetable - based with a low heavy - metal content .
Page: 3

CONTENTS ABOUT THIS GUIDE Conventions 2 Related Documentation 2 Accessing Online Documentation 3 Product Registration and Support 4 1 INTRODUCTION Product Features 5 Security 5 Wireless Network Standards 6 Network Configuration and Planning 7 Example Configurations 8 2 INSTALLING THE BRIDGE Unpacking the Bridge 9 Observing Safety Precautions 10 Deciding Where to Place the Bridge 11 Wall - Mounting the Bridge 11 Installing the Locking Bar 12 Placing the Bridge on a Flat Surface 13 Connecting the Bridge 14 Connecting to a Serial Device 14 Connecting to an Ethernet Device 15 About the Client List 15 Connecting to a Hub 15 Connecting to a Network Printer 16 Connecting to a Computer 16 Checking the LED Indicators 17 Attaching an External Antenna 18 Determining if You Need to Configure the Bridge 18 Using the 3Com Installation CD 21
Page: 4

3 CONFIGURING THE BRIDGE Using Secure Web Server Connection 23 Using the 3Com Wireless Infrastructure Device Manager 24 Using the Configuration Management System 27 Clearing and Applying System Configuration Settings 28 Changing System Properties 29 Setting IP Network Properties 30 Setting Wireless Network Properties 31 Manually Selecting Radio Channels 35 Setting Up an Ad - Hoc Network 35 Changing Wireless Security Settings 36 No Security ( Open System ) 36 40 / 64 - bit WEP Key 36 104 / 128 - bit WEP Key 37 128 / 152 - bit WEP Key 37 Dynamic WEP with LEAP - Compatible Mode 37 TKIP 38 AES 38 Managing Certificates 39 Uploading a Trusted Root Certificate 39 Uploading a User Certificate 40 Viewing and Removing Certificates 40 Configuring Certificate Validation 40 Changing RADIUS Settings 41 Using the 802.1X Exception List 42 Adding a New MAC Address to the 802.1X Exception List 43 Changing SNMP Settings 43 Using the Access Control List 44 Configuring the Serial Port 45 Configuring Operation Mode 45 Configuring UART Settings 45 Configuring Network Serial Port Settings 46 Configuring the Serial Telnet Client 48 Applying Settings 49 Configuring System Log Settings 49 Setting the System Time 49 Setting the Time Manually 50
Page: 5

Enabling the SNTP Client 50 Resetting the Bridge 51 Restoring the Bridge to Factory Defaults 51 Upgrading the Bridge Firmware 52 Using FTP ( default ) 52 Using TFTP 52 Using HTTP 53 Changing the Administration Login Name and Password 53 Backing Up Configuration Settings and System Logs 53 Restoring a Configuration 54 Clearing the Ethernet Client List 55 Viewing Connection Status 56 Viewing System Summary 56 Viewing Event Logs 57 Logging Off the Web Interface 58 4 TROUBLESHOOTING Diagnosing Problems 59 Disconnecting the Bridge 61 Uninstalling Software and Documentation 61 Upgrading Bridge Firmware 62 A OBTAINING SUPPORT FOR YOUR 3COM PRODUCT Register Your Product to Gain Service Benefits 63 Solve Problems Online 63 Purchase Extended Warranty and Professional Services 64 Access Software Downloads 64 Contact Us 64 Telephone Technical Support and Repair 65 END USER LICENSE AGREEMENT REGULATORY INFORMATION
Page: 6

ABOUT THIS GUIDE This guide provides all the information you need to install and use the 3Com 11a / b / g Wireless Workgroup Bridge in its default state . The guide is intended for use by IT managers and experienced network installation and administration professionals who have a basic knowledge of current networking concepts . If the information in the release notes that are shipped with your product differ from the information in this guide , follow the instructions in the release notes . Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format ( PDF ) or HTML on the 3Com Wide Web site : World http : / / www . 3com.com /
Page: 7

2 ABOUT THIS GUIDE Conventions Table 1 and Table 2 list conventions that are used throughout this guide . Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions . Caution Information that alerts you to potential loss of data or potential damage to an application , system , or device . Warning Information that alerts you to potential personal injury . Table 2 Text Conventions Convention Description Screen displays This typeface represents information as it appears on the screen . Syntax The word “ syntax ” means that you must evaluate the syntax provided and then supply the appropriate values for the placeholders that appear in angle brackets . Example : To change your password , use the following syntax : system password < password > In this example , you must supply a password for < password > . The words “ enter ” When you see the word “ enter ” in this guide , you must type and something , and then press Return or Enter . Do not press “ type ” Return or Enter when an instruction simply says “ type . ” Keyboard key names If you must press two or more keys simultaneously , the key names are linked with a plus sign ( + ) . Example : Press Ctrl + Alt + Del Words in italics Italics are used to : ■ Emphasize a point . ■ Denote a new term at the place where it is defined in the text . ■ Identify menu names , menu commands , and software button names . Examples : From the Help menu , select Contents . Click OK . Related In addition to this guide , each Bridge documentation set includes the Documentation following :
Page: 8

Accessing Online Documentation 3 ■ Quick Start Guide — printed guide that describes basic installation . ■ Online Help — product help systems that describe how to use the Configuration Management System and 3Com Wireless Infrastructure Device Manager . ■ Release Note — printed note that describes important product information . ■ README.TXT file — text file located on the 3Com Installation CD that describes last - minute product information . Accessing Online The CD supplied with your Bridge contains the following online Documentation documentation : ■ 3Com 11a / b / g Wireless Workgroup Bridge User Guide ■ 3Com Wireless Infrastructure Device Manager Online Help ■ 3Com 11a / b / g Wireless Workgroup Bridge Configuration Management System Online Help To access the online documentation from the CD : 1 Insert the 3Com Installation CD supplied with your Bridge in the CD - ROM drive . The setup menu appears . If it does not appear , you can start the setup menu from the Windows Start menu . For example : Start > Run > d : \ setup.exe . 2 In the menu , click View the Documentation to view the Bridge User Guide . To view the online help , install and launch the Wireless Infrastructure Chapter 3 Device Manager or Configuration Management System . See for instructions .
Page: 9

4 ABOUT THIS GUIDE Product To register your product with 3Com , go to the following Web page : Registration and http : / / esupport . 3com.com Support For support information , see “ Obtaining Support for Your 3Com Product ” on page 63 or log on to the 3Com Web site at http : / / www . 3com.com and navigate to the product support page .
Page: 10

INTRODUCTION 1 3Com wireless technology has all of the benefits of a local area network ( LAN ) without the constraints and expense of network wiring . 3Com 11a / b / g Wireless LAN products provide easy , affordable , flexible ways to extend wireless networks to more users . This guide shows how you can use the 3Com 11a / b / g Wireless Workgroup Bridge in your office or classroom to connect groups of wired Ethernet client devices to your wireless LAN . Product Features The 3Com 11a / b / g Wireless Workgroup Bridge includes a robust suite of standards - based security features , and supports wireless network standards including 802.11a and 802.11g . Security To protect sensitive data broadcast over the radio , the Bridge supports 40 / 64 - bit , 104 / 128 - bit and 128 / 152 - bit Wireless Equivalent Privacy ( WEP ) encryption . The Bridge strengthens this basic security mechanism with additional security features , including : ■ MAC address access control lists ■ IEEE 802.1X per - port user authentication with RADIUS server authentication support ■ Temporal Key Integrity Protocol ( TKIP ) ■ Advanced Encryption Standard ( AES ) ™ ■ Wi - Fi Protected Access ( WPA ) , WPA - PSK ( Pre - Shared Key ) and WPA - NONE ) ■ Extensible Authentication Protocol ( EAP ) support : EAP - TLS , EAP - TTLS and PEAP
Page: 11

6 CHAPTER 1 : INTRODUCTION Wireless Network Understanding the characteristics of the 802.11a and 802.11g standards make the best choice for your wireless implementation plans . Standards can help you 802.11a Ratified in 2002 , 802.11a is IEEE’s more recent wireless standard . It GHz band and supports data rates at up to 54 Mbps . operates at the 5 Because there are fewer devices in the 5 GHz band , there’s less potential for RF interference . However , because it is at an entirely different radio spectrum , it is not compatible with 802.11g . The higher spectrum provides about 50 m ( 164 ft ) of coverage — about what 802.11g offers . half Consider 802.11a when you need high throughput in a confined space and you are : ■ Running high - bandwidth applications like voice , video , or multimedia over a wireless network that can benefit from a five - fold increase in data throughput . ■ Transferring large files like computer - aided design files , preprint publishing documents or graphics files , such as MRI scans for medical applications , that demand additional bandwidth . ■ Supporting a dense user base confined to a small coverage area . Because 802.11a has a greater number of non - overlapping channels , you can pack more wireless devices in a tighter space . 802.11g 802.11g operates in the 2.4 GHz band at up to 54 Mbps . Ratified in the widest coverage — up to 100 m ( 328 ft ) . However , is 2003 , it supports subject to a greater risk of radio interference because it operates in the more popular 2.4 GHz band . 802.11b operates at up to 11 Mbps and supports coverage up to 100 m ( 328 ft ) .
Page: 12

Network Configuration and Planning 7 Consider 802.11g when you need wider coverage and vendor compatibility and you are : ■ Maintaining support for existing 802.11b users and the existing wireless investment while providing for expansion into 802.11g . ■ Implementing a complete wireless LAN solution , including bridges , gateways , access points and clients ; Wi - Fi certification guarantees compatibility among vendors . ■ Providing access to hot spots in public spaces such as coffee shops or university cafeterias . Network The Bridge can operate in either infrastructure or ad - hoc mode , and can Configuration and support a stand - alone wireless network configuration or an integrated Planning configuration with 10 / 100 Mbps Ethernet LANs . Operating in infrastructure mode and connected to an Ethernet hub , a single Bridge can combine up to 16 client devices — such as computers with network adapters and printers — into a multiclient workgroup . The workgroup associates with the wired network through a wireless LAN 11a / b / g Wireless LAN Access Point . access point such as the 3Com Infrastructure configurations extend your wireless LAN to devices that would otherwise have to be connected to the wired network . Operating in ad - hoc mode , two or more Bridges can associate among themselves and communicate with one another at close range without an access point . You may wish to set up an ad - hoc network , for example , if a group is working away from the office , or if a group in the office needs to share files apart from the wired LAN .
Page: 13

8 CHAPTER 1 : INTRODUCTION Example The following examples illustrate ways you can use the Bridge to Configurations configure Ethernet client devices into workgroups . ( Details for setting up “ Installing the Bridge ” on page 9 . ) specific configurations are in Wireless Infrastructure Network You can connect several computers , including those with non - Windows Figure 1 . operating systems , and network printers , as shown in Figure 1 Wireless Infrastructure Network Hub Access Point 11a / b / g W ireless T T NE NE ER ER LESS SS POWER POWER TH TH E L E E RE IRE WI W Workgroup Br idge . 11a . 11g . 100 . 10 Workgroup Ad - Hoc Network You can provide flexible wireless network association for small groups in Figure 2 . areas that cannot be wired , as shown in Figure 2 Workgroup Ad - Hoc Network Hub 11a / b / g Wireless Workgroup Brid ge . 11a . 11g . 100 . 10 Hub 11a / b / g Wireless Workgroup Brid ge . 11a . 11g . 100 . 10
Page: 14

INSTALLING THE BRIDGE 2 This chapter contains the information you need to install and set up the Bridge . It covers the following topics : ■ Unpacking the Bridge ■ Observing Safety Precautions ■ Deciding Where to Place the Bridge ■ Connecting the Bridge ■ Checking the LED Indicators ■ Attaching an External Antenna ■ Determining if You Need to Configure the Bridge ■ Using the 3Com Installation CD Unpacking the Make sure that you have the following items , which are included with the Bridge Bridge : ■ Power adapter and power cord . ■ Standard Category 5 unshielded twisted pair ( UTP ) Ethernet cable . ■ Locking bar ( used for securing a wall - mounted installation ) . ■ Rubber feet ( four ; used for a flat - surface installation ) . ■ 3Com Installation CD . For wall - mounting installations , you need the following items , which not included with the Bridge : are ■ Mounting screws . ■ Plastic anchors ( for drywall mounting ) . To secure the Bridge using the locking bar , you need a lock ( not supplied ) .
Page: 15

10 CHAPTER 2 : INSTALLING THE BRIDGE Figure 3 shows the front view of the Bridge , including the LEDs and connecting ports . It also shows the cradle , which is used to mount the Bridge to a wall or to install the Bridge on a flat surface . Figure 3 Bridge 11a / b / g Wireless Workgroup Bridge Power Port Serial Port Ethernet Port Cradle Observing Safety This equipment must be installed in compliance with local and national Precautions regulatory restrictions , and FCC rules . For the safety of building codes , people and equipment , only professional network personnel should install the Bridge . WARNING : To comply with FCC radio frequency ( RF ) exposure limits , a minimum body - to - antenna distance of 20 cm ( 8 in . ) must be maintained when the Bridge is operational . WARNING : To avoid possible injury or damage to equipment , you must use either the provided power supply or power supply equipment that is safety certified according to UL , CSA , IEC , or other applicable national or international safety requirements for the country of use . All references to power supply in this document refer to equipment meeting these requirements .
Page: 16

Deciding Where to Place the Bridge 11 Deciding Where to Place the Bridge in a dry , clean location near the hub , computer , or printer Place the Bridge that will be connected to the Bridge . The location must have a power source and be within the following distance of a Wi - Fi compliant wireless LAN access point or ad - hoc wireless station : ■ For 802.11a compatibility , place the Bridge within 50 m ( 164 ft ) of a Wi - Fi compliant wireless LAN access point . ■ For 802.11b / g compatibility , place the Bridge within 100 m ( 328 ft ) of a Wi - Fi compliant wireless LAN access point . The location should be away from transformers , heavy - duty motors , fluorescent lights , microwave ovens , refrigerators , or other equipment that could cause radio signal interference . Wall - Mounting the The Bridge comes with a cradle for mounting on a wall . For additional Bridge security , the Bridge also comes with a locking bar , which can be used with a security lock ( not provided ) to lock the Bridge to the cradle after the Bridge is mounted to a wall . To wall - mount the bridge : 1 Route the power and Ethernet cables through the large opening in the cradle . Figure 4 shows a cable being routed under the cradle . Figure 4 Routing Cable Under the Cradle 2 Screw the cradle to a wall , as shown in Figure 5 .
Page: 17

12 CHAPTER 2 : INSTALLING THE BRIDGE Figure 5 Wall - Mounting the Bridge Cradle 3 Connect the power and Ethernet cables to the ports on the Bridge . 4 Snap the Bridge onto the cradle . Installing the For additional security , install the locking bar in the cradle after the Bridge Bar Locking is mounted to the wall . Use your own lock to secure it in place . To install the locking bar : 1 Insert the locking bar through the opening in the side of the cradle , as Figure 6 . shown in Figure 6 Inserting the Locking Bar . 11a . 11g . 100 . 10 2 Push the locking bar through the opening until the hole on the locking bar is exposed .
Page: 18

Deciding Where to Place the Bridge 13 3 Insert a lock through the hole on the locking bar , and then close the lock Figure 7 . to secure it in place , as shown in Figure 7 Securing the Locking Bar . 10 . 100 . 11g . 11a Placing the Bridge on The Bridge comes with four rubber feet that can be used to install the Surface a Flat Bridge on a flat surface such as a table or desktop . CAUTION : Do not place the Bridge on any type of metal surface . Select a location that is clear of obstructions and provides good reception . Remove the backing from the rubber feet and attach them to the bottom of the cradle . After the rubber feet are installed , place the Bridge on a flat surface .
Page: 19

14 CHAPTER 2 : INSTALLING THE BRIDGE Connecting the The Bridge has power , Ethernet , and serial ports , as shown in Figure 8 . Bridge Before connecting the Bridge to an Ethernet device , connect the power . Figure 8 Connecting the Power Power Cable Ethernet Cable Connecting to a The Bridge can also be connected to a serial device , as shown in Figure 9 . Device Serial cables come with a variety of connector sizes . If your connector is Serial large and prevents the cradle from being attached to the Bridge , remove the end cap on the cradle . This allows the connector to extend through the cradle . Figure 9 Connecting a Serial Cable Serial Cable
Page: 20

Connecting the Bridge 15 Connecting to an The Bridge is designed to be connected to an Ethernet client device such Ethernet Device as a hub , computer , or printer . CAUTION : To avoid the possibility of a transmission loop situation between the Bridge and an access point , which could disrupt network operation , do not connect a Bridge that is set in Wireless Client ( Infrastructure ) mode directly to the LAN ( for example , through a wall port or through a hub that is connected directly to the LAN ) . About the Client List The Bridge supports up to 16 specific Ethernet client devices . It uses a client list of MAC addresses to keep track of specific devices that have been connected . After 16 different devices have been connected , the client list is full , and you must clear it before the next new device can associate with the network through the Bridge . To clear the list , you must access the Bridge’s Configuration Management “ Clearing the Ethernet Client List ” on page 55 . System . Details are in Connecting to a Hub You can supply network connections for up to 16 devices , such as computers and network printers , by connecting the Bridge to an Ethernet Figure 10 . hub , as shown in Figure 10 Connecting to a Hub Hub Access Uplink Port Point T RNE HE S R ELES E T E W O WIR P . 11a . 11g . 100 . 10 11a / b / g Wireless Workgroup Brid ge You can directly connect the Bridge to a hub that does not have an uplink ( MDIX ) port , without the need of an Ethernet crossover cable .
Page: 21

16 CHAPTER 2 : INSTALLING THE BRIDGE Connecting to a You can connect a network printer directly to the Bridge or to a hub that Network Printer is connected to the Bridge . Used this way , the Bridge allows you to place network printers in areas that are not wired for Ethernet . 1 Configure the network printer as you would for connecting it to the wired LAN . For details on configuring the printer , see your printer documentation . 2 If necessary , configure the Bridge to associate with your access point . 3 Connect the Bridge to the power supply in its permanent location . 4 Connect the network printer directly to the Bridge as shown in Figure 11 , or to a hub that is connected to the Bridge as shown in “ Connecting to a Hub ” on page 15 . Figure 11 Connecting to a Network Printer Access Point 11a / b / g Wireless Workgroup Brid ge RNET HE S R ELES E T E W O R WI P . 11a . 11g . 100 . 10 Connecting to a You can connect the Bridge directly to a computer through Ethernet as Figure 12 . Used this way , the Bridge can convert a desktop Computer shown in computer to a wireless computer . This connection also allows you to configure a Bridge before connecting it to another device . Figure 12 Connecting to a Computer Access Point RNET HE S R ELES E T E W O R WI P . 11a . 11g . 100 . 10 11a / b / g Wireless Workgroup Bridge
Page: 22

Checking the LED Indicators 17 Checking the LED When the Bridge is connected to power , LEDs indicate activity as follows : Indicators Figure 13 LED Indicators . 11b / g . 100 . 11a . 10 Table 3 LED Descriptions LED Color Indicates Power Green The Bridge is powered up and operating normally . Off The Bridge is not receiving power or there is a fault with the power supply . 11a Green ( solid ) The Bridge has an 802.11a 5 GHz radio band connection . Green ( blinking ) The Bridge has WLAN frame transmission over the 802.11a 5 GHz radio band . Off No link is present . 11b / g Green ( solid ) The Bridge has an 802.11g 2.4 GHz radio band connection . Green ( blinking ) The Bridge has WLAN frame transmission over the 802.11g 2.4 GHz radio band . Off No link is present . 100 Green ( solid ) The Bridge has a 100 Mbps Fast Ethernet connection . Green ( blinking ) The Bridge has 100 Mbps Fast Ethernet activity . Off No link is present . 10 Green ( solid ) The Bridge has a 10 Mbps Ethernet connection . Green ( blinking ) The Bridge has 10 Mbps Ethernet activity . Off No link is present .
Page: 23

18 CHAPTER 2 : INSTALLING THE BRIDGE Attaching an The Bridge has two internal diversity dual - band antennas . External Antenna If you want to increase the range of the Bridge , an external antenna can be attached to the external antenna connector on the Bridge . The 3Com - approved external antenna for this Bridge is the 3Com 2.4 / 5 GHz Omnidirectional Workgroup Bridge Antenna ( 3CWE501 ) . For more information , go to www . 3Com.com Determining if You If your network has a DHCP server and no special security requirements , Need to Configure you can most likely use the Bridge just as it is shipped from the factory . the Bridge It takes approximately one to two minutes for the Bridge to determine if there is a DHCP server on the network . View the Bridge’s default settings on page 20 to determine whether or not you need to configure the Bridge for your network . If the factory defaults meet your requirements , you can connect the Bridge as “ Connecting the Bridge ” on page 14 . described in If your network does not have a DHCP server or is more complex , you may have to configure the Bridge and organize devices so that you can manage the wireless LAN easily and keep it secure . You can use the 3Com Wireless Infrastructure Device Manager ( Widman ) included on the 3Com Installation CD . For non - U.S . versions of the Bridge , you need to set the Country mode . This is done when you first open the Bridge’s Configuration Management System . See “ Using the Configuration Management System ” on page 27 for instructions . Networks with a DHCP Server If your network has a DHCP server , an IP address is automatically assigned to the Bridge . It takes approximately one to two minutes for the Bridge to determine if there is a DHCP server on the network . Use the 3Com Wireless Infrastructure Device Manager ( Widman ) included on the 3Com Installation address . CD to locate the Bridge on the network and view its IP Alternatively , you can enter the Bridge’s IP address into a Web browser on a computer on the same subnet to view the Bridge’s system status or “ Configuring the Bridge ” on page 23 for change its configuration . See instructions .
Page: 24

Determining if You Need to Configure the Bridge 19 Networks without a DHCP Server If your network does not have a DHCP server , the Bridge uses a default address ( 169.254.2.2 ) that is assigned at the factory . You can use that IP address to IP address to configure the Bridge , or you can assign a new IP the Bridge . To verify that the Bridge is using the default IP address assigned at the factory : 1 Connect a computer directly to the Bridge using the supplied standard Category 5 UTP Ethernet cable . See Figure 12 on page 16 for a connection diagram . 2 Enter the Bridge’s default IP address ( 169.254.2.2 ) into the computer’s Web browser . ■ If the Configuration Management System starts , the Bridge is using the factory assigned IP address . You can configure the Bridge with the following login information : ■ Login name : admin ■ Password : none ( blank ) See “ Configuring the Bridge ” on page 23 for detailed instructions . ■ If the Configuration Management System does not start , the Bridge is on a different subnet than the computer . Install and start the 3Com Wireless Infrastructure Device Manager to discover the Bridge’s IP “ Using the 3Com Wireless Infrastructure Device address . See Manager ” on page 24 for instructions .
Page: 25

20 CHAPTER 2 : INSTALLING THE BRIDGE Bridge Default Settings Table 4 shows the Bridge configuration factory defaults . Table 4 Factory Default Settings Property Default Setting Device Name 3Com WWB Device Location None ( blank ) Country For U.S . version , United States and Canada For non - U.S . version , set by the user Client Mode Support multiple wired Ethernet clients IP Network Setting Obtain IP address automatically IP Address Obtained automatically ( with a DHCP server ) 169.254.2.2 ( without a DHCP server ) Subnet Mask Obtained automatically ( with a DHCP server ) 255.255.0.0 ( without a DHCP server ) Gateway IP Address Obtained automatically ( with a DHCP server ) 0.0.0.0 ( without a DHCP server ) Network Mode Wireless Client ( Infrastructure ) Radio Mode Auto Select Wireless LAN Service Area Attach to any WLAN Service Area ( ESSID ) automatically Channel Selection Automatic Best Channel ( uses access point setting ) Transmit Power 100 % Antenna Selection Internal Data Preamble Long ( if Network Mode is set to Ad - Hoc ) Same as access point setting ( if Network Mode is set to Wireless Client [ Infrastructure ] ) Security Setting Open System ( no security ) 802.1X Authentication State Disabled SNMP Enabled Access Control List Disabled Administration Login Name admin Administration Password None ( blank ) TFTP Server IP Address None FTP Server IP Address None
Page: 26

Using the 3Com Installation CD 21 Using the 3Com The 3Com Installation CD contains the following tools and utilities : Installation CD ■ 3Com Wireless Infrastructure Device Manager – An administration tool that helps you select 3Com wireless LAN devices and launch their configurations in your Web browser . ■ 3Com 3CDaemon Server Tool – A firmware upgrade tool that can act in four different capacities : ■ As a TFTP Server , used for firmware upgrades as well as backup and restore functions . ■ As a SysLog Server , which is necessary to view SysLog messages . ■ As an optional TFTP Client . ■ As an optional FTP Server . To use the 3Com Installation CD , you need a computer running one of the operating systems and browser listed in Table 5 . Table 5 Supported Operating Systems and Browser Operating Systems Windows XP Windows 2000 Windows NT 4.0 Windows Me Windows 98 Browser Internet Explorer ( latest version is recommended )
Page: 27

22 CHAPTER 2 : INSTALLING THE BRIDGE To install one of the tools on your computer : 1 Turn on the computer . 2 Insert the 3Com Installation CD in the CD - ROM drive . The setup menu appears . If it does not appear , you can start the setup menu from the Windows Start menu . For example : Start > Run > d:setup.exe . 3 In the menu , click Tools and Utilities . 4 In the next screen , click the tool you want to install . 5 Follow the instructions on the screens to complete the installation . Reboot the computer if prompted to do so . 6 Launch the tool from the Windows Start menu . For details on using the Wireless Infrastructure Device Manager , see “ Using the 3Com Wireless Infrastructure Device Manager ” on page 24 . For instructions on using the 3CDaemon Server Tool , see the application’s online help .
Page: 28

CONFIGURING THE BRIDGE 3 If the Bridge configuration that was set at the factory does not meet your network requirements , or if you want to customize the settings , you can use these tools to change the configuration : Table 6 Configuration Tools Configuration Tool Description 3Com Wireless Helps you locate 3Com wireless LAN devices on the Infrastructure Device network , select a device and view its properties , and Manager ( Widman ) launch the device’s configuration in your Web browser . See “ Using the 3Com Wireless Infrastructure Device Manager ” on page 24 for details . 3Com 11a / b / g Wireless Resides on the Bridge and lets you configure the Bridge Workgroup Bridge through your Web browser . The latest version of Configuration Internet Explorer is recommended . Management System See “ Using the Configuration Management System ” on page 27 for details . Using Secure Web The Bridge can be configured using Secure Socket Layer ( SSL ) technology , Server Connection which is used to encrypt data exchanged between the computer and the Bridge during a configuration session . Without SSL enabled , data is exchanged in the form of plain text and can be intercepted during the configuration session . You must enable the HTTPS option to establish a secure session . “ Web GUI Protocol ” in Table 9 on page 30 for instructions . See
Page: 29

24 CHAPTER 3 : CONFIGURING THE BRIDGE Using the 3Com The 3Com Wireless Infrastructure Device Manager ( Widman ) helps you Wireless locate 3Com wireless LAN devices on the network , select a device and Infrastructure view its properties , and launch the Configuration Management System in Device Manager your Web browser . The Wireless Infrastructure Device Manager must be installed on a computer that : ■ Has a working Ethernet adapter . ■ Is running Internet Explorer and one of the Windows operating “ Using the 3Com Installation CD ” on page 21 . systems listed in ■ Is on the same subnet as the Bridge . See “ Using the 3Com Installation CD ” on page 21 for installation instructions . The device to be configured using the Wireless Infrastructure Device Manager must be : ■ Connected to a power source . ■ Wired to the network , associating with the wireless network , or , in some cases with the Bridge , connected directly to the computer . If there is more than one device with the same name in the network ( for example , 3Com WWB ) , make a note of the MAC address of the device you want to select so that you can identify it in the device manager . If you do not have a DHCP server on your network , it can take up to one minute for a device to become discovered after it has been powered up . To use the 3Com Wireless Infrastructure Device Manager : 1 Launch the device manager by selecting Start > Programs > Wireless > Wireless Infrastructure Device Manager . 3Com If you have more than one network adapter installed on your computer , you may be prompted to choose a network adapter . Choose the appropriate adapter and click OK . The Wireless Network Tree appears in the 3Com Wireless Infrastructure Figure 14 . Device Manager window , as shown in The tree lists all WLAN service areas on the network and expands to show the 3Com wireless LAN devices that are associated to each service area . Devices
Page: 30

Using the 3Com Wireless Infrastructure Device Manager 25 in a different subnet than your computer are identified with exclamation points ( ! ) . You can refresh this display by clicking Refresh . You should refresh address . the display , for example , after you change a device IP Figure 14 Wireless Infrastructure Device Manager Wireless Network Tree 2 In the Wireless Network Tree , select the device you want to configure . If more than one wireless LAN device appears in the tree and you are not sure that you have selected the right one , click Properties and check the MAC address to verify that it is the one you want . 3 Click Configure . ■ If the selected device is on the same subnet as your computer , the Configuration Management System main page appears in your Web “ Using the Configuration Management System ” on browser . See page 27 , for details . ■ If the selected device is on a different subnet , the device manager helps you to assign an IP address on the same subnet as your Figure 15 . You may accept the address offered computer , as shown in or enter an address and click Next .
Page: 31

26 CHAPTER 3 : CONFIGURING THE BRIDGE Figure 15 Wireless Infrastructure Device Manager Pre - IP Configuration 4 The next window prompts for an administrative password to allow the new IP address to be set . If this is the first time the device is being configured , leave the password field blank and click Next . The configuration main page appears in your Web browser . See “ Using the Configuration Management System ” on page 27 for details . Table 7 describes the functions of the buttons in the 3Com Wireless Infrastructure Device Manager window . Table 7 Infrastructure Device Manager Options Button Description Properties Displays the following properties of the selected device : Device Name , Device Type , Wireless LAN Service Area ( ESSID ) , Address , Subnet Mask , and MAC Address . IP Configure Launches the Configuration Management System for the selected device . If the selected device is on a different subnet , you are prompted to assign an address on the same subnet as your computer . Refresh Scans the network and displays the connected 3Com 11a / b / g Wireless LAN devices . Choose NIC If your computer has more than one network interface card installed , allows you to choose which card to use . Close Closes the device manager window and ends the session . Help Launches the device manager help page in your browser .
Page: 32

Using the Configuration Management System 27 Using the The 3Com11a / b / g Wireless Workgroup Bridge Configuration Configuration Management System resides on the Bridge and lets you configure the Management Bridge through your Web browser . System To use the Configuration Management System , the computer you are using to connect to the Bridge must be located on the same subnet as the Bridge . There are two ways to access the Configuration Management System : ■ Enter the IP address of the Bridge in your computer’s Web browser . ■ Start the 3Com Wireless Infrastructure Device Manager , locate the Bridge , and then click Configure . For non - U.S . versions of the Bridge , when you first open the Configuration Management System you are prompted to select the country in which the Bridge is operating . Select the country in which the Bridge is installed to ensure compliance with local regulations , and then click Apply . When you first open the Configuration Management System , you are prompted for a user name and password : ■ User name — admin ■ Password — blank ( press Enter ) The Configuration Management System displays the Connection Status Table 8 . page , as detailed in Table 8 Connection Status Page Property Description Default Value Connection The MAC address of the associated N / A access point . Network Type The type of network for which the Wireless Client Bridge is configured : Wireless ( Infrastructure ) Client ( Infrastructure ) or Ad - hoc ( Peer - to - Peer ) . SSID The Service Set ID . If this field Auto Select displays Auto Select , it means the Bridge automatically associated with the access point that has the strongest signal .
Page: 33

28 CHAPTER 3 : CONFIGURING THE BRIDGE Table 8 Connection Status Page ( continued ) Radio Mode The way in which the Bridge selects Auto - Select a radio band . Current Channel The channel over which the Bridge Varies is communicating with clients . Security The type of security for which the Open System Bridge is configured . ( no security ) Rx Data Rate ( Mbps ) The most recent data reception N / A rate . Tx Data Rate ( Mbps ) The most recent data transmission N / A rate . Link Quality The normalized transmitted data N / A rate ( that is , the current data rate over the maximum data rate ) . Link Quality is shown in Wireless Client ( Infrastructure ) mode only . Received Signal The strength of the radio signal N / A Strength that the Bridge detects . Received Signal Strength is shown in Wireless Client ( Infrastructure ) mode only . Activity ( Packets Rx ) The number of packets the Bridge N / A has received . Activity ( Packets Tx ) The number of packets the Bridge N / A has transmitted . IP Address The IP address of the Bridge . Varies Clearing and The pages in the Configuration Management System have two buttons : Applying System Clear and Apply . Configuration ■ Clear returns the settings to the values they were when you last Settings clicked Apply . ■ Apply stores the settings permanently in the nonvolatile flash memory . After you click Apply , the new settings take effect and you can see the changes on the System Summary page . CAUTION : Your changes are lost if you forget to click Apply before moving to a new configuration page .
Page: 34

Changing System Properties 29 Changing System Under System Configuration , click System Properties . The System Properties Properties page displays the properties of the selected Bridge . You can change Table 9 ) . When you are properties by entering a value in a field ( see finished , click Apply . Table 9 describes the properties . Table 9 System Properties Page Property Description Default Value Device Name This name appears in the System 3Com WWB Summary window . You can change the default name to one of your choice . Device Location If you use the default device name , None entering the location is optional . Client Mode This setting allows the Bridge to support Support multiple wired single or multiple Ethernet clients Ethernet clients attached to the Bridge . Support Single Wired Ethernet Client is used only when the Bridge is used for replacement of a 3Com Ethernet Client Bridge . Select a MAC option : ■ Capture : Each time the Bridge is powered on , it captures its MAC address from the first packet it receives on the Ethernet port . The Bridge detects and uses the same MAC address as the device plugged into the Ethernet port . The Bridge uses the previously captured MAC address upon power - on until the first packet is received on the Ethernet port . ■ Dynamic : The Bridge changes its MAC address each time the device plugged into the Ethernet port changes . The Bridge detects the MAC address of the device plugged into the Ethernet port and uses that as its own . The Bridge uses the built - in MAC address upon power - on until a packet is received on the Ethernet port . ■ Built - in : The Bridge uses the manufacturing radio MAC address as default .
Page: 35

30 CHAPTER 3 : CONFIGURING THE BRIDGE Table 9 System Properties Page Web GUI This setting allows users to enable the HTTP Protocol secure data exchange scheme over SSL during a configuration session . HTTPS — enables SSL technology . HTTP — disables SSL technology . WidMan RSSI When enabled , WidMan shows a graph Disable Monitor Support of the signal strength received by the Bridge over time . To view the RSSI monitor , click the device icon on WidMan , click Properties , and then click RSSI Monitor . Enabling RSSI monitoring on WidMan is helpful when making antenna adjustments . You can ensure optimal device placement and orientation based on the signal strength shown on WidMan . Setting IP Network Under System Configuration , click IP Network . The IP Network Properties Properties Table 10 . page appears , where you can change the settings shown in If you change the IP address and click Apply , you cannot continue to configure the device using the old IP address . Therefore , you must do the following steps after changing the IP address : 1 Close your browser . 2 Return to the 3Com Wireless Infrastructure Device Manager and click Refresh . 3 Select the device and click Configure to start a new configuration session . Table 10 describes the IP Network properties .
Page: 36

Setting Wireless Network Properties 31 Table 10 IP Network Properties Page Setting Description Default IP Network Setting This setting allows you to change the IP Obtain an IP address of the device . address automatically To let the device get an IP address automatically from a DHCP server , select Obtain an IP address automatically and click Apply . To specify an IP address , select Specify an IP address , enter the IP address parameters in the spaces provided , and click Apply . IP Address When Specify an IP address is selected , N / A enter the IP address in the space provided , and click Apply . Subnet Mask When Specify an IP address is selected , N / A enter the Subnet Mask in the space provided , and click Apply . Gateway IP Address When Specify an IP address is selected , N / A enter the Gateway IP Address in the space provided , and click Apply . Setting Wireless Under System Configuration , click Wireless Network . The Wireless Network Properties Network Properties page appears , where you can select different wireless Table 11 . When you are finished , click Apply . settings , as described in The Bridge supports Dynamic and Static Turbo modes and boosts throughput up to 108 Mbps . The Dynamic Turbo mode allows automatic switching between normal and turbo modes without modification by the user . The feature increases throughput when bandwidth demands are high . When bandwidth demands are low and at regular intervals , normal mode allows legacy connectivity and new associations . The Dynamic Turbo mode connection between the Bridge and the access point may turn to normal mode connection if another wireless station associates with the access point in normal mode . The Static Turbo mode operates by using two radio channels and does not switch to normal mode . Static Turbo mode must be configured by the user on both the access point and the station .
Page: 37

32 CHAPTER 3 : CONFIGURING THE BRIDGE Table 11 Wireless Network Page Setting Description Default Network Mode Select Wireless Client ( Infrastructure ) to Wireless Client associate with an access point . ( Infrastructure ) Select Ad - hoc ( Peer - to - Peer ) to join or form an ad - hoc network . Radio Mode See “ Network Configuration and Auto Select Planning ” on page 7 for information on selecting the best Radio Mode for your network . ■ Select Auto Select to have the Bridge Mode select the best Radio automatically . ■ Select 802.11a to set the Bridge to operate with either 802.11a mode or 802.11a Dynamic Turbo mode . Dynamic Turbo mode is entered only when the channel is set to 40 , 48 , 56 , 153 , or 161 for 802.11a networks . ■ Select 802.11a Turbo to set the Bridge to operate with 802.11a Static Turbo mode . Do not select this mode unless the access point you intend to associate with is running in 802.11a Static Mode . ■ Select 802.11b / 802.11g to set the Bridge to operate with either 802.11b / g mode or 802.11g Dynamic Turbo mode . Dynamic Turbo mode is entered only when the channel is set to 6 for 802.11g networks . ■ Select 802.11g Turbo to set the Bridge to operate with 802.11g Static Turbo mode . Do not select this mode unless the access point you intend to associate with is running in 802.11g Static mode .
Page: 38

Setting Wireless Network Properties 33 Table 11 Wireless Network Page ( continued ) Wireless LAN Select Attach to any WLAN Service Area Attach to any Service Area ( ESSID ) automatically to allow the Bridge WLAN Service to associate with any access point without Area ( ESSID ) specifying the ESSID . In this mode , the automatically Bridge uses the ESSID of the access point with the best signal strength . This mode is not available when the network mode is Ad - hoc ( Peer - to - Peer ) . Select Specify the Wireless LAN Service Area to allow the Bridge to associate only with access points with the same service area . You may enter the WLAN service area name or select it from the list . You must specify the WLAN service area when the network mode is Ad - hoc ( Peer - to - Peer ) . To maintain a wireless association , the WLAN service area on a Bridge and the access point with which it is associated must match exactly . Therefore , if the Bridge is set to Specify the WLAN Service Area and you change the access point WLAN service area , make sure to also change the Bridge WLAN service area .
Page: 39

34 CHAPTER 3 : CONFIGURING THE BRIDGE Table 11 Wireless Network Page ( continued ) Channel Selection If Radio Mode is set to Auto Select , you do not have the following options to choose from . When the network mode is Wireless Client ( Infrastructure ) , a user may have the Bridge automatically select an appropriate channel by using Automatic Best Channel or specify the channels by using Specify Channel . When the network mode is Ad - hoc ( Peer - to - Peer ) you may specify channel selection as follows : ■ Automatic Best Channel — When this option is enabled , the Bridge scans the primary channels . If the Bridge is establishing a new ad - hoc network , it chooses the channel with the least number of packets . If the Bridge is joining an existing ad - hoc network , it selects the channel in use . ■ Specify Channel — Click the button preceding this option and enter the Advanced Wireless Network page . On this page , you can choose channels from the Channel list . Transmit Power This option specifies the level of 100 % transmission power . Select one of the values ( 100 % , 50 % , 25 % , 12 % , min ) from the drop - down menu . Decrease the Transmit Power setting if more than one Bridge is using the same channel frequency . Antenna Selection Select an antenna for the radio signal : Internal ■ Internal — this default setting should be used in most circumstances . ■ External and one internal antenna — this setting automatically determines which antenna is best for sending packets to individually attached clients . Choose this setting if the Bridge is located in a place that is surrounded or hindered by metal paths or walls .
Page: 40

Manually Selecting Radio Channels 35 Table 11 Wireless Network Page ( continued ) Data Preamble To increase performance , click Short Long ( Enhanced performance ) . When equipment that does not support short preamble is also being used , click Long ( Wi - Fi Interoperable ) . Note : The Data Preamble option is only available in 802.11b / g ad - hoc mode . Manually Selecting On the Advanced Wireless Network page , you can manually select the Radio Channels radio channels . The bridge only looks for the best SSID that matches one of the specified channels . Setting Up an Operating in ad - hoc mode , two or more Bridges can associate among Ad - Hoc Network themselves to form an ad - hoc network without the intervention of an access point . You may wish to set up an ad - hoc network , for example , if a group is working away from the office , or if a group in the office needs to share files apart from the wired LAN . CAUTION : To ensure correct operation , the settings on the two Bridges must match exactly . To avoid the possibility of losing wireless association that you connect the Bridge while you are configuring , 3Com recommends directly to the computer . 1 Connect the first Bridge to power and use the Ethernet cable to connect it to the computer . 2 Use the 3Com Wireless Infrastructure Device Manager to select the Bridge and launch the Configuration Management System . 3 Under System Configuration , click Wireless Network . 4 In the Wireless Network page : a Locate the Network Mode field and select Ad - hoc ( Peer - to - Peer ) . b Specify the Wireless LAN Service Area and the Channel Selection as “ Setting Wireless Network Properties ” on page 31 . described in c Set the Data Preamble . To increase performance , select Short ( Enhanced performance ) . When equipment that does not support short preamble is also being used , ( Wi - Fi Interoperable ) . When you are finished , click Apply . select Long
Page: 41

36 CHAPTER 3 : CONFIGURING THE BRIDGE Security settings default to Open System ( no security ) . Optionally , you can “ Changing Wireless Security set different security settings as described in Settings ” on page 36 . 5 When you are finished , click Apply . 6 End the browser session . 7 Repeat steps 1 – 6 with the second Bridge . Make sure you configure Bridge settings to match exactly . When you are finished , click Apply and end the browser session . 8 Connect the Ethernet devices to the Bridges . If you use hubs , make sure that the Bridges are connected through the hub uplink ports . Changing Wireless Under System Configuration , click Wireless Security . The Wireless Security Security Settings Settings page appears , where you can select the type of security to be used on the Bridge . The Bridge can be configured to support three types of data encryption : WEP , TKIP , and AES . After selecting a data encryption type , you can select an authentication type . The following sections describe the settings . To maintain wireless association , the settings on clients and the access points they associate with ( or other members of an ad - hoc network ) must match exactly . No Security ( Open No security policy is used . Network communications could be intercepted System ) by unintended recipients . 40 / 64 - bit WEP Key This option encrypts the wireless transmissions to protect data , but still allows communication among compatible wireless LAN clients and access points from third - party manufacturers that are Wi - Fi certified . This type of security requires you to set up encryption in one of the following ways : ■ String ( 3Com Passphrase ) – For use only with other 3Com 11a / b / g wireless devices , an encryption string is a case - sensitive string of characters between 6 and 30 characters long . To enter the string , select Enter a string to generate WEP keys . Then type any combination of letters and numbers in the space provided and select Apply .
Page: 42

Changing Wireless Security Settings 37 ■ WEP Key – May be in ASCII or HEX . Hexadecimal keys are sequences of hexadecimal digits arranged into four keys . A hexadecimal digit to F or a number from 0 to 9 . This type of may be a letter from A encryption is compatible with equipment from other manufacturers that use Wi - Fi certified 40 - bit encryption . To enter the keys , select Specify WEP keys and which to use . In the WEP keys window , enter all the keys in the provided spaces , then select a radio button in the Selected Key column to specify which key to use and select Apply . 104 / 128 - bit WEP Key This option can be used with other 3Com 11a / b / g Wireless LAN devices and with equipment from certain manufacturers that also support 104 / 128 - bit WEP key encryption . It provides a higher level of security than the 40 / 60 - bit WEP key ( Wi - Fi ) option and uses a more complicated type of encryption . This type of security requires you to set up encryption “ 40 / 64 - bit WEP Key ” on using a string or WEP keys as described in page 36 . To create or modify WEP keys , click the Specify WEP keys and which key to use option . 128 / 152 - bit WEP Key This option can be used with other 3Com 11a / b / g Wireless LAN devices and with equipment from certain manufacturers that also support 128 / 152 - bit WEP key encryption . It provides a higher level of security than the 104 / 128 - bit WEP Key option and uses a more complicated type of encryption . This type of security requires you to set up encryption using a “ 40 / 64 - bit WEP Key ” on page 36 . string or WEP keys as described in To create or modify WEP keys , click the Specify WEP keys and which key to use option . Dynamic WEP with LEAP ( Lightweight Extensible Authentication Protocol ) is a security LEAP - Compatible scheme based on the 802.1X authentication framework . It provides Mode mutual authentication between the RADIUS server and the Bridge , and generates dynamic per - user , per - session WEP keys . To use dynamic WEP with LEAP - compatible mode , you must have : ■ A RADIUS server set up on the network ■ An account created on the RADIUS server
Page: 43

38 CHAPTER 3 : CONFIGURING THE BRIDGE To configure dynamic WEP with LEAP - compatible mode : 1 On the Wireless Security page , click Dynamic WEP with LEAP - compatible mode . 2 In User name , type the user name for your RADIUS account . 3 In Password , type the password for your RADIUS account . 4 Click Apply . TKIP The Temporal Key Integrity Protocol ( TKIP ) option improves data encryption over WEP scheme by dynamically updating the encryption keys every 10,000 packets . TKIP provides per - packet key mixing , a message integrity check , and a re - keying mechanism . To use TKIP : 1 On the Wireless Security page , select TKIP . 2 Select WPA - PSK for home network or WPA for the scenarios where RADIUS servers are employed : ■ WPA - PSK ( in infrastructure mode ) or WPA - NONE ( in ad - hoc mode ) : Enter a pass - phrase key or hexadecimal key . The key can be generated based on a pass - phrase or a sequence of manually entered 64 hexadecimals . The 64 hexadecimals can be automatically generated by selecting Generate a Random Key . ■ WPA : Select an authentication type , and enter a user name and a password for TTLS and PEAP , or select a user certificate for TLS . If you select LEAP - compatible mode , enter the user name and password for your RADIUS account . These options are not available in ad - hoc mode . 3 Select Apply . AES The Advanced Encryption Standard ( AES ) option uses the highest security cipher for data encryption . To use AES : 1 On the Wireless Security page , select AES . 2 Select WPA - PSK for home network or WPA for the scenarios where RADIUS servers are employed : ■ WPA - PSK ( in infrastructure mode ) or WPA - NONE ( in ad - hoc mode ) : Enter a pass - phrase key or hexadecimal key . The key can be generated based on a pass - phrase or a sequence of manually entered 64
Page: 44

Managing Certificates 39 hexadecimals . The 64 hexadecimals can be automatically generated by selecting Generate a Random Key . ■ WPA : Select an authentication type , and enter a user name and a password for TTLS and PEAP , or select a user certificate for TLS . If you select LEAP - compatible mode , enter the user name and password for your RADIUS account . These options are not available in ad - hoc mode . 3 Select Apply . Managing Under System Configuration , click Certificate Management . The Certificates Certificate Management page appears where you can manage certificates and set options of certificate validation . If you have a RADIUS server on the network and you want to use the TLS authentication method , you need to upload the certificates to the Bridge . There are two types of certificates : trusted root certificate and user certificate . Trusted root certificates are required for TLS with the option Validate server certificate enabled , while user certificates are mandatory to TLS . You need to copy certificates to the computer in which you configure the Bridge with a Web browser before you can upload them to the Bridge . Uploading a Trusted You can upload up to 64 trusted root certificates . To upload a trusted root Root Certificate certificate : 1 Under Trusted root certificate , click Add , and then enter the Upload Trusted Root Certificate page . 2 In File Name , type the file name manually , or click Browse to select a trusted root certificate stored on your local computer . Click Open to upload the certificate . 3 In Description , type a brief description for the certificate . This can help you identify this specific certificate , if there are other trusted root certificates on the system . 4 Click Upload . When a trusted root certificate is uploaded successfully , it appears in the list on the Certificate Management page .
Page: 45

40 CHAPTER 3 : CONFIGURING THE BRIDGE Uploading a User You can upload up to eight user certificates . To upload a user certificate : Certificate 1 Under User certificate , click Add , and then enter the Upload Trusted Root Certificate page . 2 In File Name , type the file name manually , or click Browse to select a trusted root certificate stored on your local computer . Click Open to upload the certificate . 3 In File Password , type the password for the user certificate . Normally , we set the password for protecting the private key when we export the user certificate from the Web browser . If you are not sure about the password , contact the person responsible for generating certificates in your organization . 4 In Description , type a unique description for the certificate . This is the certificate nickname that you need to select on either the AES or TKIP page . 5 Click Upload . When a user certificate is uploaded successfully , it appears in the list on the Certificate Management page . Viewing and Click View to view a certificate , or click Remove to delete a certificate . Removing Certificates The certificate that you just removed disappears from the certificate list . CAUTION : Removing a certificate that is used for authentication will cause authentication to fail . Configuring The following table lists the options for validating certificates from the Certificate Validation RADIUS server . To enable an option , select the corresponding check box . Table 12 Certificate Validation Options Setting Description Validate server certificate Select to enable validation of server certificate . Validate server certificate time Select to check the validity period of the RADIUS server certificate . If certificate has already expired , the Bridge will reject the certificate and authentication will fail . Server’s name must end with Select this check box , and then type the characters with which the server name ends to verify the information in the certificate’s subject name field .
Page: 46

Changing RADIUS Settings 41 Changing RADIUS Under System Configuration , click RADIUS . The RADIUS page appears , Settings where you can set the primary and secondary RADIUS Server settings . This page allows for configuration of a Remote Access Dial - in User Service ( RADIUS ) server for authentication purposes in 802.1X networks . You can change the settings by entering values in the fields as described in Table 13 . When you are finished , select Apply .
Page: 47

42 CHAPTER 3 : CONFIGURING THE BRIDGE Table 13 RADIUS Authentication Server Settings Setting Description 802.1X Enable or disable RADIUS authentication by selecting Enable Authenticator State or Disable . Primary RADIUS Enter the IP address of the primary RADIUS Authentication Server Server . Make sure this address matches the address set in the RADIUS Authentication software . Primary RADIUS Port Enter the port number of the primary RADIUS Authentication Server . Make sure this number matches the number set in the RADIUS Authentication software . The default port is 1812 . Primary RADIUS Enter the password of the primary RADIUS Authentication Secret Server . Make sure this password matches the password set in the RADIUS Authentication software . Secondary RADIUS Enter the IP address of the secondary RADIUS Authentication Server Server . Make sure this address matches the address set in the RADIUS Authentication software . Secondary RADIUS Enter the port number of the secondary RADIUS Port Authentication Server . Make sure this number matches the number set in the RADIUS Authentication software . The default port is 1812 . Secondary RADIUS Enter the password of the secondary RADIUS Authentication Secret Server . Make sure this password matches the password set in the RADIUS Authentication software . Using the 802.1X Use the 802.1X Exception List page to allow Ethernet clients to bypass Exception List 802.1X authentication . The default state is Disabled . To build the 802.1X Exception List : 1 Under System Configuration , click RADIUS . 2 On the RADIUS page , click Click here to specify MAC addresses to bypass 802.1X authentication . 3 On the 802.1X Exception List page , click Add . The 802.1X Exception List New MAC page appears . 4 In MAC Address , type the MAC address of the client you want to add to the 802.1X Exception List , and then click the Add . 5 For each client that you want to add to the 802.1X Exception List , repeat steps 3 and 4 . 6 On the 802.1X Exception List page , click Enable in 802.1x Exception State .
Page: 48

Changing SNMP Settings 43 7 Click Apply . To delete one or more clients from the 802.1X Exception List : 1 On the 802.1X Exception List page , select the check box for the client or clients that you want to delete . 2 Click Delete . 3 Click Apply . Adding a New MAC Use the New MAC page to add a client to the 802.1X Exception List . Address to the 802.1X Exception List 1 In MAC address , type the MAC address of the client you want to add to the 802.1X Exception List . 2 Click Add . 3 To add another client , repeat steps 3 and 4 in “ Using the 802.1X Exception List ” startin on page 42 . 4 When finished , click Apply on the 802.1X Exception List page . Changing SNMP Under System Configuration , click SNMP to display and change settings Settings for the Simple Network Management Protocol . To communicate with the Bridge , the SNMP agent must first be enabled and the Network Management Station must submit a valid community string for authentication . Select SNMP Enable and enter data into the fields as described below . When you are finished , click Apply . Table 14 SNMP Settings Setting Description SNMP Enables or disables SNMP . Contact Sets the location string that describes the system location . Maximum length : 255 characters . Community Name Specifies a community string with read - only access . ( Read Only ) Authorized management stations are able to retrieve MIB objects . Maximum length : 23 characters . Community Name Specifies a community string with read - write access . ( Read / Write ) Authorized management stations are able to both retrieve and modify MIB objects . Maximum length : 23 characters .
Page: 49

44 CHAPTER 3 : CONFIGURING THE BRIDGE Table 14 SNMP Settings ( continued ) Trap Destination Enter the IP address of the trap manager that will receive Address IP these messages . Trap Destination Enter the community name of the trap manager that will Community Name receive these messages . Using the Access Under System Configuration , click Access Control List . The Access Control Control List List page appears where you can allow or prohibit access to the wireless network from Ethernet clients . Follow these steps to build the Access Control List : 1 Under System Configuration , click Access Control List . 2 On the Access Control List page , click Add . The Access Control List New ACL page appears . 3 On the New ACL page , enter the MAC address of the client you want to Control List , select the permission type , and click the add to the Access Add button to substantially add it . 4 Repeat steps 2 and 3 for each client . 5 Select the System Default Mode : ■ Allow — allows the client to access the Bridge . ■ Deny — prohibits the client from accessing the Bridge . CAUTION : With the Allow option of the System Default Mode selected , the Bridge allows all Ethernet frames except those carrying the addresses that are specified in the Access Control List and have the MAC permission type Deny . Similarly , with the Deny option of the System Default Mode selected , the Bridge denies all Ethernet frames except those carrying the MAC addresses that are specified in the Access Control List and have the permission type Allow . Make sure that the MAC address of the computer through which you are configuring the Bridge is not specified in the Access Control List with the permission type Deny if you want to set the access control type to Allow . If you want to set the Access Control Type to Deny , make sure that the MAC address of the computer is included in the Access Control List with the permission type Allow . Failure to do so results in access to the Bridge being blocked ; the Bridge will no longer be configurable through the computer .
Page: 50

Configuring the Serial Port 45 6 Click Apply . To delete one or more clients from the Access Control List : 1 Select the client or clients . 2 Click Delete . 3 Click Apply . Configuring the Under System Configuration , click Serial Port to set up operation of Serial Port network serial port or serial telnet client . Configuring Attach your computer to both the Ethernet port and the serial port on the Operation Mode Bridge , and then configure the Bridge through the computer . Refer to Table 15 for the available settings . Table 15 Serial Port Settings Setting Description Default Operation Mode Select Enable to enable serial port Disable function . Select Disable to enable CLI console function . Serial Port Mode Enable network serial port or serial N / A telnet client Configuring UART A Universal Asynchronous Receiver / Transmitter ( UART ) is the fundamental Settings hardware for serial communication , controlling the speed and method of data transfer of the serial port . For proper operation , it is imperative that these settings always match the settings of the device to which the bridge is connected via the RS - 232 port . There are two groups of parameters that need to be configured to accomplish this task : UART Settings and Flow Control Settings . Flow control is the process of adjusting the flow of data from one device to another to ensure that the receiving device can handle all of the incoming data . Table 16 UART Settings Setting Description Default Baud Rate The baud rate indicates the data 9600 transfer rate of the serial port .
Page: 51

46 CHAPTER 3 : CONFIGURING THE BRIDGE Table 16 UART Settings Setting Description Default Data Bits The data bits setting determines the 8 number of bits used to transmit a character . Parity The parity determines the parity None checking scheme . Stop Bits The stop bits setting determines the 1 number of bits used to represent an end of a character . Flow Control Flow control is the process of adjusting None the flow of data from one device to another to ensure the receiving device can handle all of the incoming data . Configuring Network Applications utilizing a network serial port between an RS - 232 interface Serial Port Settings and a wireless device use a TCP / IP socket connection . Any program that uses standard TCP / IP network sockets may be used to communicate with the serial port of the Bridge . Once a socket is established to the Bridge , any data written to the socket is sent out the serial port of the Bridge . At the same time , any data received by the serial port of the Bridge is returned via the socket connection . The Bridge network serial port may be used in two modes : ■ Server Mode — TCP Listen Port ■ Client Mode — TCP Connect Port In Server Mode , the Bridge waits for a TCP / IP socket connection to be made by the network program with which it will communicate . Mode should be used if you have a central server that expects to Server open a TCP / IP socket connection to the Bridge . In Client Mode , the Bridge establishes a socket connection to the address and port number specified in the configuration . Client Mode IP should be used if your system expects the Bridge to open a TCP / IP socket connection to a central server . For Server Mode , click Server Mode and enter the port number to which the Bridge connects in the List on port field . The default port number is 4000 .
Page: 52

Configuring the Serial Port 47 For Client Mode , select Client Mode and enter the IP address and port number to which the Bridge connects . The default port number is 4000 . The parameters Line Length , Timeout and Delimiter control the serial - to - network packet conversion process . Most users will not need to change them . These parameters control the way that data received on the serial port is divided into Ethernet packets . The serial packets are sent to a serial network connection . ■ Line Length – As data arrives on the serial port it is accumulated in a buffer in the Bridge . The Line length parameter sets the maximum size for this buffer . When the number of characters in the buffer reaches the Line length value the entire buffer is sent as the data in a single network packet . The value of Line length can range from 1 to 1,408 bytes . The default value is 1,408 . Do not use values of line length less than 5 with a serial baud rate of 115,200 or greater . ■ Timeout – Often serial data arrives in small bursts of characters . When the Bridge receives a burst of data it will wait for a certain period of time for additional data to be received . If additional data is received , it is added to the receive buffer , and the Bridge begins to wait again . If additional data is not received for longer than the period specified by the Timeout value , then the buffer of characters received is sent in a single network packet , and the process begins again . The value of timeout is in units of milliseconds , and should be specified in 10 millisecond increments . The valid range for timeout is from 10 ( 0.01 second ) to 65,000 ( 650 seconds ) . The default value is 10 . ■ Delimiters – Some serial devices transmit and receive data in a known structure . In these cases , there are often special characters that the transmitting device uses to indicate a complete message has been sent . These characters are referred to as delimiters . You can specify up to five different delimiting characters to the Bridge . When the Bridge adds one of these characters to its buffer of serial received characters , it will immediately send that buffer as a network packet . The value of delimiters is specified as a list of hexadecimal values separated by spaces . You may specify up to five different delimiter
Page: 53

48 CHAPTER 3 : CONFIGURING THE BRIDGE values . For example , if you want to use the delimiter 41375 , you must type the following hex values : 0x34 0x31 0x33 0x37 0x35 If you are unsure of the hex value for your delimiter character , consult the Web page www.asciitable.com for reference . Configuring the Serial Telnet is a method to connect and remotely log - in to a host computer or Telnet Client network device . The host computer or device must be running a telnet server for this service to be available . Once the telnet session is established from the Bridge , any data received on the serial port of the Bridge is sent to the telnet host . At the same time , any data returned from the host is sent to the serial port on the Bridge . Typically , the serial port of the Bridge is connected to a serial terminal or a computer that is running terminal emulation software . To configure the serial telnet client , you must select one of the following telnet connection methods : ■ Wait for Keystroke – This method establishes a connection to a specific telnet host when you press a key on the telnet terminal window . When the telnet connection is closed , the Bridge will wait for a keystroke before reconnecting . If you select the Wait for Keystroke method , you also need to configure the following : ■ Connect to IP - Type the IP address of the telnet host to which you want to connect ■ Connect to Port - Type the telnet port number ■ Command Prompt - This method provides a “ telnet prompt ” to the serial terminal . From the telnet prompt , you can start a telnet session to any computer or device that is accessible on the network and is capable of accepting telnet connections . To establish a telnet connection , type the command “ open ” followed by the IP address of the host computer or device . The IP address may optionally be followed by the TCP port number on which to open the connection . If the port number is omitted , the default telnet port number of 23 is used .
Page: 54

Configuring System Log Settings 49 Applying Settings After you set the UART settings , network serial port settings or serial telnet client settings , click Apply to apply them . Configuring System Under System Configuration , click System Log . The System Log page Log Settings appears where you can set syslog options . Table 17 System Log Settings Setting Description Default Syslog Server The IP address of the syslog server on 0.0.0.0 the network Syslog Port The port number that the syslog server 514 uses to received log data Syslog Level Select the highest log level that you Error want the Bridge to record . Options include ( from the highest to lowest ) : ■ Emergency - System is unusable ■ Alert - Action must be taken immediately ■ Critical - Critical condition ■ Error - Error condition ■ Warning - Warning condition ■ Notice - Normal , but significant condition ■ Informational - Informational messages ■ Debug - Debug - level message CLI Logging Select Enable to record all CLI Enable commands . Web Audit Select Enable to record all operations Enable Logging executed on the Web interface . Setting the System Under System Configuration , click SNTP . The SNTP page appears where Time you can set time relevant options . There are two ways you can set the system time on the Bridge : ■ By setting the time manually ■ By enabling the built - in Simple Network Time Protocol ( SNTP ) client
Page: 55

50 CHAPTER 3 : CONFIGURING THE BRIDGE If you enable the SNTP client , you need to specify at least one SNTP server from which the Bridge will retrieve the time . Supported SNTP versions are v1.0 and v2.0 . Setting the Time To set the time manually : Manually 1 In SNTP Client , click Disable . 2 In Set Time , type the current year , month , day , hour , and minute . For the hour option , use the 24 - hour clock format ( for example , 13 : 00 for 1 : 00 PM ) . 3 In Time Zone , select the correct time zone for your location . Selecting the correct time zone ensures that the time recorded in the system logs are synchronized with your local time . 4 If the time zone you selected is currently implementing daylight saving time ( DST ) , click Enable in Daylight Saving , and then set the time period during which DST will be in effect . 5 Click Apply to save your changes . The DST option is only available if the time zone you selected is known to implement daylight saving time . Enabling the SNTP When an SNTP server is specified , the Bridge will attempt to query the Client system time from this server every 60 seconds . To enable the SNTP client : 1 In SNTP Client , click Enable . 2 In Primary Server , type the IP address of the SNTP server from which the Bridge will get its system time . 3 In Primary Port , type the port number used by the SNTP server for communicating with clients . 4 To set a secondary SNTP server , specify the IP address and port in Secondary Server and Secondary Port , respectively . Specifying a secondary SNTP server is optional . The Bridge will only attempt to query the time from the secondary SNTP server if it cannot connect to the primary SNTP server . 5 Click Apply to save your changes .
Page: 56

Resetting the Bridge 51 Resetting the If the Bridge stops responding correctly , you can perform a reset , which Bridge disrupts the network association temporarily , but does not affect Bridge configuration settings that have already been applied with Apply . To reset the Bridge , under Tools , click Reset Wireless Workgroup Bridge . In the next page , click Reset . The Bridge can also be reset using the Wireless Infrastructure Device Manager ( Widman ) . Right - click the Bridge in Widman , and then select Reset . Restoring the You can restore Bridge settings to the defaults that were set at the factory Bridge to Factory either manually or through software . Defaults To restore the settings manually , insert a pointed object ( such as the end of a straightened paper clip ) into the reset hole on the back of the Bridge , and hold for five seconds . The reset hole is accessible with the Bridge in the cradle , as shown in Figure 16 , or with the Bridge out of the cradle . Figure 16 Manually Resetting the Bridge in the Cradle Reset Hole ERESETT RES To restore the settings through software : 1 Under Tools , click Restore Factory Defaults . 2 Click Restore .
Page: 57

52 CHAPTER 3 : CONFIGURING THE BRIDGE If the Bridge was using an IP address setting other than the default , restoring the factory defaults will change the IP address . If you want to continue configuring the Bridge , do the following : 1 Close your browser . 2 Return to the 3Com Wireless Infrastructure Device Manager and click Refresh . 3 Select the device and click Configure to start a new configuration session . Upgrading the You can download firmware updates or updates to the Configuration Bridge Firmware Management System from the 3Com Web site and install these on the Bridge . Options for upgrading the system include using a Trivial File Transfer Protocol ( TFTP ) server or File Transfer Protocol ( FTP ) server . The Bridge acts as a TFTP or FTP client to receive the download . Alternatively , you an use the HTTP option and upload the firmware from a downloaded file placed on your computer . Using FTP ( default ) The general instructions for installing the upgrade using FTP are : 1 Under Tools , click Upgrade System . 2 Select FTP . 3 Enter the IP address of the FTP server where the upgrade files are located . 4 Enter the user name , password , path and filename in the appropriate fields . 5 Click Upgrade . Using TFTP The general instructions for installing the upgrade using TFTP are : 1 Under Tools , click Upgrade System . 2 Select TFTP . 3 Enter the file name for the firmware . 4 Enter the IP address of the TFTP server where the upgrade files are located . 5 Click Upgrade .
Page: 58

Changing the Administration Login Name and Password 53 Using HTTP The general instructions for installing the upgrade using HTTP are : 1 Under Tools , click Upgrade System . 2 Select HTTP . 3 Click Browse to locate the downloaded firmware file . 4 Click Upgrade to start the upgrade process . The upgrade takes place through the HTTP protocol from the local computer . Changing the 3Com recommends that you set a password to protect against Administration unauthorized access . After you set the password , you must enter it each Login Name and time you launch the configuration for the device . Password Under Tools , click Change Administration Password . The Change Administration Password page appears . Use this page to change the login name and administration password for the device . Enter the current password and new password in the spaces provided and click Save . Backing Up As part of system maintenance , you should save and back up the Configuration configurations of individual Bridges , in case you need to reload them in Settings and the future . The backup saves all the parameters of the selected Bridge in System Logs a file on your computer . The file can be used later to restore the configuration on this or another bridge . If you want to keep a record of the system logs on the Bridge , you can also back them up using the same Backup page of the Web interface . To back up the configuration file or system logs : 1 Under Tools , click Backup . 2 In Backup Type , specify whether you want to back up the Configuration File or the System Log File . If you are backing up the configuration file , specify whether you want to back up the Complete Configuration or the Basic Configuration in Configuration File Type . Complete configuration includes the following information : ■ User name and password
Page: 59

54 CHAPTER 3 : CONFIGURING THE BRIDGE ■ Device name ■ Device location ■ IP address settings ■ Access control list Basic configuration , on the other hand , includes the same set of information , except the IP address settings . 3 Click the backup method that you want to use . Available options include FTP , TFTP , and HTTP . ■ If you clicked FTP , you need to provide the following information : ■ FTP Server IP Address – IP address of the FTP server to which the backup file will be saved ■ User name and password – Your logon information to the FTP server . This account must have write permission to the server . ■ Path – File path on the FTP server to which to save the backup ■ File Name – File name that you want to assign to the backup ■ If you clicked TFTP , you need to provide the following information : ■ File Name – File name that you want to assign to the backup ■ TFTP Server IP Address – IP address of the TFTP server to which the backup file will be saved . Before backing up via TFTP , verify that the TFTP service on the target server is running . ■ If you clicked HTTP , you do not need to provide additional information . When you click Backup Now , a File Download / Save As dialog box will appear . Specify a location on your local computer where you want to save the backup , and then click Save . 4 Click Backup Now . Restoring a If you previously saved a copy of the configuration file , you can restore Configuration the Bridge settings in this configuration file by uploading this to the Bridge . CAUTION : Restoring a previously saved configuration file will override some of your current settings .
Page: 60

Clearing the Ethernet Client List 55 To restore a previously saved configuration file : 1 Under Tools , click Restore . 2 Click the backup method that you want to use . Available options include FTP , TFTP , and HTTP . ■ If you clicked FTP , you need to provide the following information : ■ FTP Server IP Address – IP address of the FTP server from which the backup file will be copied . The backup file must exist on this FTP server . ■ User name and password – Your logon information to the FTP server ■ Path – File path to ( or location of ) the backup file on the FTP server ■ File Name – File name of the backup file that you want to restore ■ If you clicked TFTP , you need to provide the following information : ■ File Name – File name of the backup file that you want to restore ■ TFTP Server IP Address – IP address of the TFTP server from which the backup file will be copied . Before backing up via TFTP , verify that the TFTP service on th target server is running . ■ If you clicked HTTP , the backup file must either be on the computer that you are using to access the Web interface or on a network location that can be accessed from the computer . Click Browse , select the backup file , and then click Open . 3 Click Restore . The settings in the backup file are restored and applied to the Bridge . This operation may cause the Bridge to reboot . If the Bridge was using an IP address setting other than the one contained in the backup file , restoring the configuration will change the IP address . If you want to continue configuring the Bridge , do the following : 1 Close your browser . 2 Return to the 3Com Wireless Infrastructure Device Manager , and then click Refresh . 3 Select the device and click Configure to start a new configuration session . Clearing the A maximum of 16 clients ( for example , computers and printers ) can Ethernet Client List associate with the Bridge . The Bridge keeps track of these clients based
Search in Networking Related on ebay
"