Online Assistance
1.0 Introduction
1.2 Radio Basics
The Root AP and Association Process
IEEE 802.1d Spanning Tree Support
1.3 Access Point Functional Theory
Auto Fallback to Wireless Mode
Direct Sequence Spread Spectrum
Supporting CAM and PSP Stations
Programmable SNMP Trap Support
Using Direct Serial Connection
Setup Network Web Server Help File Access
Set Up Network Web Server Help File Access
Configuring for Dial-Up to the UI
Configuring the Dial-Up System
Navigating the UI Using a Web Browser
2.4 Configuring Security Parameters
System Password Administration
2.5 Configuring System Parameters
Configuring Mobile Home MD5 Key
2.6 Configuring Radio Parameters
2.7 Wireless Operation Parameters
2.8 Configuring the SNMP Agent
Configure Read-Write Community
2.9 Configuring PPP
2.10 Configuring the ACL
2.11 Configuring Address Filtering
2.12 Configuring Type Filtering
2.14 Updating AP Firmware
2.15 Mobile IP Using MD5 Authentication
2.16 Special Functions
2.18 Resetting the AP
2.19 Flashing AP LEDs
3.4 EthernetStats
3.10 Known APs
3.11 Mobile Units
3.12 Clearing Statistics
4.1 Precautions
4.2 Package Contents
4.3 Requirements
4.4 Placing the AP
4.5 Power Options
4.6 Mounting the AP
4.7 Connecting the Power Adapter
4.8 LED Indicators
4.9 Troubleshooting
4.10 Setting Up MUs
A.0 Conventions
Intel® PRO/Wireless 2011B LAN is a spread spectrum cellular network that operates at 2.4 gigahertz. This technology provides a high capacity network using multiple points within large or small environments.
The Intel PRO/Wireless 2011B and 2011 LAN Access Points are direct sequence (DS) products. They use direct sequence technology to provide a high-capacity, high-data-rate wireless network.
Intel® PRO/Wireless 2011 LAN infrastructure products include:
The Access Point (AP) provides a bridge between Ethernet wired LANs and Intel® PRO/Wireless 2011 LANs. It provides connectivity between Ethernet wired networks and radio-equipped mobile units (MUs). MUs include the full line of Intel terminals, PC Cards and PCI adapters, bar-code scanners, third-party devices, and other devices.
The AP provides an 11 Mbps data transfer rate on the radio network. It monitors Ethernet traffic and forwards appropriate Ethernet messages to MUs over the Intel PRO/Wireless 2011 LAN. It also monitors MU radio traffic and forwards MU packets to the Ethernet LAN.
The AP meets the following:
The AP has the following features:
When properly configured, an MU communicating with an AP appears on the network as a peer to other network devices. The AP receives data from its wired interfaces and forwards the data to the proper interface.
The AP has connections for the wired network and power supply. The AP attaches to a wall or ceiling depending on installation-site requirements.
Intel PRO/Wireless 2011 LAN devices use electromagnetic waves, radio signals, to transmit and receive information without wires. Users communicate with the network by establishing radio links between terminals and access points.
Intel® PRO/Wireless 2011 LAN devices use FM (frequency modulation) to transmit digital data from one device to another. Using FM, a radio signal begins with a carrier signal that provides the base or center frequency. The digital data signal is superimposed on the carrier signal (modulation). The radio signal propagates into the air as electromagnetic waves. A receiving antenna in the path of the waves absorbs the waves as electrical signals. The receiving device demodulates the signal by removing the carrier signal. This demodulation results in the original digital data.
Intel PRO/Wireless 2011 LAN devices use the environment (the air and certain objects) as the transmission medium. Intel® PRO/Wireless 2011 LAN radio devices transmit in the 2.4 to 2.5-GHz frequency range, a license-free range throughout most of the world. The actual range is country-dependent.
Intel PRO/Wireless 2011 LAN devices, like other Ethernet devices, have unique, hardware-encoded Media Access Control (MAC) or IEEE addresses. MAC addresses determine the device sending or receiving data. A MAC address is a 48-bit number written as six hexadecimal bytes separated by colons. For example:
00:A0:F8:24:9A:C8
To locate the access point MAC address see the bottom of the unit.
The variations possible in Intel PRO/Wireless 2011 LAN topologies depend on the following factors:
NOTE: | A WLAP communicates only with its root AP through the wireless interface as discussed in The Root AP and Association Process. |
Select from the following topologies:
In WLAP mode, a wireless AP-to-AP connection functions:
NOTE: | When using a wireless AP-to-AP connection, use the optimal antenna configuration for the site. For example, use an omnidirectional antenna when establishing a dedicated wireless bridge or repeater. |
Using more than two WLAPs to establish a connection slows network performance for all topologies. To increase WLAP performance, disable WNMP Functions and AP-AP State Xchg parameters under the Set System Configuration screen.
To set up an AP for wireless operation automatically, select the /Enabled/ option for the WLAP Mode parameter. To set these values see Configuring Radio Parameters.
NOTE: | The WLAP initialization process length depends on the time specified in the WLAP Forward Delay field. See Wireless AP Setup. |
The access point establishes an average communication range with MUs called a Basic Service Set (BSS) or cell. When in a particular cell, the MU associates and communicates with the AP of that cell. Each cell has a Basic Service Set Identifier (BSS_ID). In 802.11, the AP MAC address represents the BSS_ID. The MU recognizes the AP it associates with using the BSS_ID. Adding APs to a LAN establishes more cells in an environment, making it an RF Network using the same Net_ID or Extended Service Set (ESS).
APs with the same Net_ID (ESS_ID) define the coverage area. The MU searches for APs with a matching ESS_ID and synchronizes with an AP to establish communications. This allows MUs within the coverage area to move about or roam. As the MU roams from cell to cell, it switches APs. The switch occurs when the MU analyzes the reception quality at a location and decides the AP to communicate with based on the best signal strength and lowest MU load distribution.
If the MU does not find an AP with a workable signal, it performs a scan to find any AP. As MUs switch APs, the AP updates the association table.
The user can configure the ESS_ID. A valid ESS_ID is an alphanumeric, case-sensitive identifier up to 32 characters. Ensure all nodes within one LAN use the same ESS_ID to communicate on the same LAN. Multiple wireless LANs can coexist in a single environment by assigning different ESS_IDs for APs.
By default, access points with WLAP Mode enabled and within range of each other automatically associate and configure wireless operation parameters at power up. This association process determines the wireless connection viability and establishes the Root AP and subsequently designated WLAPs.
NOTE: | Access points communicating wirelessly together require the same Net_ID (ESS), Encryption mode, Data Rate and Short RF Preamble settings. |
The root AP maintains the wireless connection among WLAPs by sending out beacons, sending and receiving configuration BPDU (Bridge Protocol Data Unit) packets between each designated WLAP. The WLAP with the lowest WLAP ID becomes the Root AP. A concatenation of the WLAP Priority value and the MAC address becomes the WLAP ID. Ensure the WLAPs associated with the Root AP use the Root AP channel, DTIM (Delivery Traffic Indication Message) and TIM (Traffic Indication Map) interval.
In this configuration, the WLAP Priority value is the default 8000 Hex. On concatenating this value to the MAC addresses of the APs, AP A on Ethernet I has the lowest WLAP ID with 800000A0F800181A, making it the Root AP. AP C uses the AP A channel, DTIM and TIM interval.
If AP D on Ethernet II has data for a device on Ethernet I, it requires a bridge or a repeater. In this configuration, AP C functions as a repeater. To ensure transmission to devices on Ethernet I, AP D has to use the AP A hop sequence, DTIM and TIM interval.
To manually designate AP B as the Root AP, assign it a lower WLAP Priority value. Refer to Wireless AP Parameters. Assigning a WLAP Priority value of 7000 Hex to the AP B MAC address 00:A0:F8:11:23:5D causes AP B to become the Root AP by having the lowest WLAP ID 700000A0F811235D.
This protocol creates a loop-free topography with exactly ONE path between every LAN. This is the shortest path from the Root AP to each access point and LAN. If an access point or LAN fails, a new route is calculated and added to the tree. All packet forwarding follows the spanning tree. Access points have to choose one access point as the Root AP. The same holds true for WLAPs associating with the root AP or another access point connected to the Ethernet LAN to prevent forming loops.
For optimal performance, locate computers with wireless adapters and access points away from transformers, heavy-duty motors, fluorescent lights, microwave ovens, refrigerators and other industrial equipment.
Signal loss can occur when metal, concrete, walls or floors block transmission. Locate access points in open areas or add access points as needed to improve coverage.
A site survey analyzes the installation environment and provides users with recommendations for the
equipment and its placement. The optimum placement of 11 Mbps access points differs from 1 or 2 Mbps access points, because the locations and
number of access points required are different.
To improve access point management and performance, users need to understand basic access point functionality and configuration options. The access point includes features for different interface connections and network management.
The access point provides MAC layer bridging between its interfaces. The access point monitors traffic from its interfaces and, based on frame address, forwards the frames to the proper destination. The access point tracks the frames' sources and destinations to provide intelligent bridging as MUs roam or network topologies change. The access point also handles broadcast and multicast message initiations and responds to MU association requests.
The access point listens to all packets on all interfaces and builds an address database using the unique IEEE 48-bit address (MAC address). An address in the database includes the interface media that the device uses to associate with the access point. The access point uses the database to forward packets from one interface to another. The bridge forwards packets addressed to unknown systems to the Default Interface (either Ethernet or PPP).
NOTE: | The access point (AP) internal stack interface handles all messages directed to the access point. |
Each access point stores information on destinations and their interfaces to facilitate forwarding. When a user sends an ARP (Address Resolution Protocol) request packet, the access point forwards it over all enabled interfaces (Ethernet, PPP, radio and WLAP) except over the interface the ARP request packet was received. On receiving the ARP response packet, the access point (AP) database keeps a record of the destination address along with the receiving interface. With this information, the access point forwards any directed packet to the correct destination. The access point forwards packets for unknown destinations to the Ethernet interface.
NOTE: | ARP request packets received over radio echo back over radio for other MUs to hear. |
The access point removes from its database destinations or interfaces not used for a specified time. The access point refreshes its database when it transmits or receives data from these destinations and interfaces.
The access point provides facilities to limit the MUs that associate with it and the data packets that can forward through it. Filters can provide network security or improve performance by eliminating broadcast/multicast packets from the radio network.
The ACL (Access Control List) contains the MAC addresses for MUs allowed to associate with the access point. This provides security by preventing unauthorized access.
The access point uses a disallowed address list of destinations. This feature prevents the access point from communicating with specified destinations. This can include network devices that do not require communication with the access point or its MUs.
Depending on the setting, the access point can keep a list of frame types that it forwards or discards. The Type Filtering option prevents specific frames (indicated by the 16-bit DIX Ethernet Type field) from being processed by the access point. These include certain broadcast frames from devices unimportant to the wireless LAN but which take up bandwidth. Filtering out unnecessary frames can also improve performance.
The access point supports an Auto Fallback to Wireless when the hardware Ethernet connection fails or becomes broken. The Auto Fallback function operates only with an access point in WLAP Mode and connected to the Ethernet network. The access point resets itself and during initialization attempts to associate with any other WLAP in the network.
Refer to Configuring System Parameters and Wireless Operation Parameters.
NOTE: | To make this feature available set the WLAP Mode to Link Required. |
The access point uses Dynamic Host Configuration Protocol (DHCP) to obtain a leased IP address and network configuration information from a remote server. DHCP is based on BOOTP protocol. DHCP can coexist or interoperate with BOOTP. An access point sends out a DHCP request searching for a DHCP server to acquire the network configuration and firmware file names. Because BOOTP and DHCP are interoperable, whichever responds first becomes the server allocating the information. The DHCP client automatically sends a DHCP request every XX hours/days to renew the IP address lease as long as the access point is running. (This parameter is programmed at the DHCP server. Example: Windows NT servers typically are set for 3 days.)
The access point can optionally download two files when a boot takes place, the firmware file and an HTML file. Users can program the DHCP or BOOTP server to transfer these two files when a DHCP request is made.
When the access point receives a network configuration change or is not able to renew the IP address lease the access point sends out an SNMP trap.
NOTE: | Mobile IP is not available when DHCP is used. Disable DHCP support when configuring an access point and mobile device for Mobile IP. |
The access point supports bridging between Ethernet, radio and serial media.
The Ethernet interface fully complies with Ethernet Rev. 2 and IEEE 802.3 specifications. The access point supports 10Base-T wired connections and full-speed filtering. The data transfer rate over radio waves is 11 Mbps. The Ethernet interface is optional for single-cell or PPP-connected networks.
The radio interface conforms to IEEE 802.11 specification. The interface operates at 11 Mbps using direct sequence radio technology. The access point supports multiple-cell operations with fast roaming between cells. With the direct sequence system, each cell operates independently. Each cell provides an 11 Mbps bandwidth. Adding cells to the network provides increased coverage area and total system capacity. The access point supports MUs operating in Power Save Polling (PSP) mode or Continuously Aware Mode (CAM) without user intervention.
The DB 9-pin RS-232 serial port provides a UI (User Interface) or a (Point to Point Protocol) connection. The UI provides basic management tools for the access point. The PPP provides a link between access points using a serial connection. The serial link supports short haul (direct-serial) or long haul (telephone-line) connections. The access point is a DTE (Data Terminal Equipment) device with male pin connectors for the RS-232 port. Connecting the access point to a PC requires a null modem cable and connecting the access point to a modem requires a straight-through cable.
The Access Point PPP (Point to Point Protocol) interface, accessible from the serial port at the rear of the access point, provides two types of bridging operations:
A PPP link provides the option of using a direct serial link or modem to extend wired Ethernet topologies.
Once in PPP mode, the access point automatically attempts to communicate with the other device using the Data-Link Bridging (DLB) protocol. An access point using DLB communicates on the MAC level, and receives and transmits Ethernet frames.
If the other device does not support DLB, the access point attempts to communicate using Internet Protocol Control Protocol (IPCP). An access point using IPCP communicates on the IP level, and receives and transmits IP (Internet Protocol) packets.
The PPP implementation in the access point uses the Link Control Protocol (LCP) and Network Control Protocol (NCP) as described in:
RFCs are Requests For Comments used in Internet Communities.
The access point database dynamically tracks MUs and access points on the PPP interface. Packets forward to the PPP link after the access point determines their destination.
NOTE: | The PPP implementation in the access point uses the NCP as described in RFC 1220: PPP Extensions for Bridging to encapsulate packets at the Ethernet level. The PPP provides IP bridging control as defined by RFC 1172 and MAC-level bridging. It provides support for PPP negotiations conforming to RFC 1661. Users cannot plug a non-AP node directly into the access point serial port, only AP-to-AP PPP links. |
Refer to RFC 1171: The Point to Point Protocol and RFC 1220: PPP Extensions for Bridging for information.
RFCs (Request For Comments) can be found on the Web at: http://www.cis.ohio-state.edu/hypertext/information/rfc.html or http://www.sri.ucl.ac.be/SRI/normes/rfc.html.
Connecting two access points with a direct serial link requires a null-modem serial cable. | ![]() |
Connecting two access points with modem devices requires straight-through cables between the access points and modems. Using modems requires using a telephone line for as long as the link remains active. | ![]() |
When using a modem connection, one access point represents the originating access point and the other represents the answering access point. When using a PPP link, do not use the serial port to access the UI. Access to the UI requires establishing a Telnet session with the access point. |
Spread spectrum (broadband) uses a narrowband signal to spread the transmission over a segment of the radio frequency band or spectrum. Direct sequence is a spread spectrum technique where the transmitted signal is spread over a particular frequency range. The Intel PRO/Wireless 2011 LAN Access Point uses direct sequence spread spectrum (DSSS) for radio communication.
Direct sequence systems communicate by continuously transmitting a redundant pattern of bits called a chipping sequence. Each bit of transmitted data is mapped into chips by the access point and rearranged into a pseudorandom spreading code to form the chipping sequence. The chipping sequence is combined with a transmitted data stream to produce the access point output signal.
NOTE: | In the United States, the three non-overlapping direct sequence channels are 1, 6 and 11. |
Mobile Units receiving a direct sequence transmission use the spreading code to map the chips within the chipping sequence back into bits to recreate the original data transmitted by the access point. Intercepting and decoding a direct sequence transmission requires a predefined algorithm to associate the spreading code used by the transmitting access point to the receiving MU. This algorithm is established when the access point and MU are configured. The bit redundancy within the chipping sequence enables the receiving MU to recreate the original data pattern, even if bits in the chipping sequence are corrupted by interference.
The ratio of chips per bit is called the spreading ratio. A high spreading ratio increases the resistance of the signal to interference. A low spreading ratio increases the bandwidth available to the user. The access point uses two chips per bit among three channels within the 2.4 GHz band in a pattern avoiding any 1 or 2 Mbps systems operating in the same area. The access point is capable of an 11 Mbps data transmission rate, but the coverage area is less than a 1 or 2 Mbps access point since coverage area decreases as bandwidth increases.
Access points recognize MUs as they associate with the access point. The access point keeps a list of the MUs it services. MUs associate with an access point based on the following conditions:
MUs perform preemptive roaming by intermittently scanning for access points and associating with the best available access point. Before roaming and associating with access points, MUs perform full or partial scans to collect access point statistics and determine the direct sequence channel used by the access point.
Scanning is a periodic process where the MU sends out probe messages on all frequencies defined by the country code. The statistics enable an MU to reassociate by synchronizing its frequency to the access point. The MU continues communicating with that access point until it needs to switch cells or roam.
MUs perform full scans at start-up. In a full scan, an MU uses a sequential set of channels as the scan range. For each channel in range, the MU tests for CCA (Clear Channel Assessment). When a transmission-free channel becomes available, the MU broadcasts a probe with the ESS_ID and the broadcast BSS_ID. An AP-directed probe response generates an MU ACK (Mobile Unit Acknowledgment) and the addition of the access point to the access point table with a proximity classification. An unsuccessful AP packet transmission generates another MU probe on the same channel. If the MU fails to receive a response within the time limit, it repeats the probe on the next channel in the sequence. This process continues through all channels in the range.
MUs perform partial scans at programmed intervals, when missing expected beacons or after excessive transmission retries. In a partial scan, the MU scans access points classified as proximate on the AP table. For each channel, the MU tests for CCA. The MU broadcasts a probe with the ESS_ID and broadcast BSS_ID when the channel is transmission-free. It sends an ACK to a directed probe response from the access point, and updates the AP table. An unsuccessful AP packet transmission causes the MU to broadcast another probe on the same channel. The MU classifies an access point as out-of-range in the AP table if it fails to receive a probe response within the time limits. This process continues through all access points classified as proximate on the AP table.
An MU can roam within a coverage area by switching access points. Roaming occurs when:
An MU selects the best available access point and adjusts itself to the AP direct sequence channel to begin association. Once associated, the access point begins forwarding any frames it receives addressed to the MU. Each frame contains fields for the current direct sequence channel. The MU uses these fields to resynchronize to the access point.
The Internet Protocol currently identifies the MU point of attachment to a network through its IP address. The host routes packets for the MU according to the location information contained in the IP header. If the MU roams across routers, the following situations occur:
Mobile IP enables an MU to communicate with other hosts using only its home IP address after changing its point-of-attachment to the internet/intranet.
Mobile IP is like giving an individual a local post office a forwarding address when leaving home for an extended period. When mail arrives for the individual's home address it is forwarded by the local post office to the individual's current care-of-address. This way only the local post office need be notified of the individual's current address instead of each correspondent. While the example given is the general concept of Mobile IP operation and functionality it does not represent the implementation of Mobile IP used.
A tunnel is the path taken by the original packet encapsulated within the payload portion of a second packet to some destination on the network.
A Home Agent is an access point acting as a router on the MU's home network. The home agent intercepts packets sent to the MU's home address and tunnels the message to the MU at its current location. This happens as long as the MU keeps its home agent informed of its current location on some foreign link.
A Foreign Agent is an access point acting as a router at the MU's location on a foreign link. The foreign agent de-tunnels packets for the MU sent by the MU's home agent. The foreign agent also serves as the default router for packets sent out by the MU connected on the same foreign link.
A care-of-address is the IP address used by the MU visiting a foreign link. This address changes each time the MU moves to another foreign link. It can be viewed as an exit point of a tunnel between the MU's home agent and the MU itself.
The Mobile IP (roaming across routers) feature enables an MU on the Internet to move from one subnet to another while keeping its IP address unchanged.
NOTE: | To configure this feature, refer to Configuring System Parameters. |
The scanning and association process continues for active MUs. This allows the MUs to find new access points and discard out-of-range or deactivated access points. By always testing the airwaves, the MUs can choose the best network connection available.
The following diagram illustrates Mobile IP (roaming across routers):
NOTE: | Set the MU for Mobile IP as specified in the MU's user documentation. |
Security has become a concern to mobile users. Enabling the Mobile-Home MD5 key option in System Configuration generates a 16-byte checksum authenticator using an MD5 algorithm. The MU and access point share the checksum, called a key, to authenticate transmitted messages between them. The key is shared between the access point and MU while the MU is visiting a foreign subnet. The MU and access point have to use the same key. If not, the access point refuses to become the Home Agent for the MU. The maximum key length is 13 characters. The access point allows all printable characters.
CAM (Continuously Aware Mode) leave their radios on continuously and hear every beacon and message transmitted. These systems operate without any adjustments by the access point. A beacon is a uniframe system packet broadcasted by the access point to keep the network synchronized. A beacon includes the Net_ID (ESS_ID), the access point address, the Broadcast destination addresses, a time stamp, a DTIM (Delivery Traffic Indication Message), and the TIM (Traffic Indication Map).
PSP (Power Save Polling) stations power off their radios for long periods. When an Intel® PRO/Wireless 2011 LAN MU in PSP mode associates with an access point, it notifies the access point of its activity status. The Intel® PRO/Wireless 2011 LAN access point responds by buffering packets received for the MU. The access point uses a PSP performance index from 1 to 5, where 1 provides the quickest response time and 5 provides the most efficient power consumption. Performance index 0 is reserved for CAM. Using this index, the access point selects an appropriate tuning value for the power save algorithm. The access point firmware switches to CAM when frames are sent or directed frames are received.
The performance index is used to select how long the adapter stays in CAM after transmit or receive activity and to configure the PSP interval when there is no activity. The awake interval in PSP performance index 1 is long enough to allow for round-trip packet response times. The packet response time in PSP performance index 5 is only 25 msec. The adapter goes back to sleep and requires another wake up period to receive data.
When the MU wakes up and sees its bit set in the TIM, it issues a poll request to the access point for packets stored for it. The access point sends them to the MU and the MU goes back to sleep. A DTIM field is a countdown field informing MUs of the next window for listening to broadcast and multicast messages. When the access point has buffered broadcast or multicast messages for associated MUs, it sends the next DTIM with a DTIM Interval value. To prevent a PSP-mode MU from sleeping through a DTIM notification, select a PSP mode value less than or equal to the DTIM value. PSP-mode MUs hear the beacons and awaken to receive the broadcast and multicast messages.
A TIM is a compressed virtual bitmap identifying the access point associated MUs in PSP mode that have buffered directed messages. MUs issue a poll request when access points issue a TIM. A beacon with the broadcast-indicator bit set causes the MU to note DTIM Count field value. The value informs the MU of the beacons remaining before next DTIM. This ensures the MU turns on the receiver for the DTIM and the following BC/MC packet transmissions.
Intel PRO/Wireless 2011 LAN devices operating on a wired or wireless network face possible information theft. This occurs when an unauthorized user eavesdrops on someone else to glean information. The absence of a physical connection makes wireless links particularly vulnerable to this form of theft.
Encryption becomes the most efficient method in preventing information theft and improving data security. Encryption entails scrambling and coding of information, typically with mathematical formulas called algorithms, before information is transmitted over any a network. An algorithm is a set of instructions or formula for scrambling the data. A key is the specific code used by the algorithm to encrypt or decrypt the data. Decryption is decoding and unscrambling the received encrypted data.
The same device, host computer or front-end processor, usually performs both encryption and decryption. The data transmit or receive direction determines whether the encryption or decryption function is performed. The device takes plain text, encrypts or scrambles it typically by mathematically combining the key with the plain text as instructed by the algorithm; it then transmits the data over the network. At the receiving end another device takes the encrypted text and decrypts, unscrambles, it revealing the original message. An authorized user can know the algorithm, but cannot interpret the encrypted data without the appropriate key. Only the sender and receiver of the transmitted data know the key.
Intel uses the Wired Equivalent Privacy (WEP) algorithm, specified in IEEE 802.11 section 8, for encryption and decryption. WEP uses the same secret key for both encrypting and decrypting plain text. Typically an external key management service distributes the secret key. Users should change the key often for added security. IEEE 802.11 defines two types of authentication, Open System and Shared Key. Open system authentication is a null authentication algorithm. Shared key authentication is an algorithm where both the access point and the MU share an authentication key to perform a checksum on the original message.
By default, IEEE 802.11 devices operate in an open system network where any wireless device can associate with an access point without authorization. A wireless device with a valid shared key is allowed to associate with the access point. Authentication management messages (packets) are unicast, meaning authentication messages transmit from one access point to one MU only, not broadcast or multicast.
The native language of the Web is Hypertext Transfer Protocol (HTTP). The protocol makes requests from browsers (the user) to servers and responses from servers to browsers. This function provides the user with a web-based format for configuration and firmware download capabilities. Web pages are written in the Hypertext Markup Language (HTML). HTML allows the user to create web pages containing text, graphics and pointers or links to other web pages or elsewhere on the page or document. Pointers are generally known as Uniform Resource Locators (URLs). A URL is essentially the name of the web page. There are three parts to the URL:
The HTML language describes how to format the document much like a copy editor describes which fonts to use, such as the location, color, header size and text.
Managing Intel PRO/Wireless 2011 LAN includes viewing network statistics and setting configuration options. Statistics track network activity of associated MUs and data transfers on the access point interfaces. Configuration involves setting system operating parameters.
The access point requires one of the following to perform a custom installation or maintain the Intel PRO/Wireless 2011 LAN:
Make configuration changes to access points individually. Each access point requires an individual IP address.
The SNMP protocol defines the method for obtaining information about networks operating characteristics and changing router and gateway parameters. The SNMP protocol consists of four elements:
Nodes can perform as hosts, routers, bridges or other devices that can communicate status information. An SNMP Agent is a node running the SNMP management process to systematically monitor and manage the network. The management station manages the network by running the special management application suite that analyzes network operation.
An SNMP trap is an unsolicited alert to all configured management station indicating some significant event has occurred on the network. The management station queries for details of each specific event, including what, when, where the event took place and the current status of the node or network. The format or structure is defined in the SNMP protocol. The MIB defines and monitors the variables.
The access point includes SNMP agent versions accessible through a SNMP manager application such as, HP Open View or Cabletron Spectrum MIB browser. The SNMP agent supports SNMP versions 1 and a subset of version 2, MIB II, the 802.11 MIB and one proprietary Intel MIB (Management Information Base). The SNMP agent supports read-write, read-only or disabled modes. The access point supports traps that return to the SNMP manager when certain events occur. The Intel CD packaged with MUs contains the MIB.
The MIB (Management Information Base) defines what the management station needs to understand and which objects the station manages.
The UI (User Interface) is a maintenance tool integrated into the access point. It provides statistical displays, access point configuration options, and firmware upgrades. Access to the UI requires one of the following:
Telnet Client | Access to the access point built-in Telnet server from any access point interface includes remote Ethernet connections. Refer to Using Telnet. |
Direct Serial Connection | The access point acts as a DTE device to connect directly to a DTE device with a null-modem serial cable. The direct serial access method requires a communication program with ANSI emulation. Refer to Using Direct Serial Connection. |
Dial Up Access | The dial-up access method requires a communication program with ANSI emulation on the remote terminal or PC. The terminal or PC dials to an access point with a modem connection. The access point supports connection to a Hayes-compatible 28,800-baud or faster modem. Refer to Using a Dial-Up Connection. |
SNMP Using a MIB Browser | Access to the access point SNMP function using a MIB Browser. Typically a Network Manager uses this feature. However, Intel does not recommend access point access using this interface method. Refer to the MIB Browser documentation for usage. |
Web Browser | Access to the access point built-in Web server from any access point interface including Ethernet connections. Refer to Using a Web Browser. |
Software configuration requires setting up a connection to the access point and gaining access to the UI (User Interface).
Setting up access to the UI depends on the connection used. Select the setup that best fits the network environment.
Using a Telnet session to gain access to the UI requires a remote station to have a TCP/IP stack. The remote station can be on the wired or wireless LAN.
To access the access point from the workstation:
NOTE: | The password is case-sensitive. |
Set the System Password in the Set System Configuration screen.
The AP serial port is a DB-9 9-pin male connector. The serial port allows PPP connections to another access point, or a UI connection to a configuration PC. Connecting the access point directly to a PC with a DB 9-pin serial port requires a null modem cable with the following configuration: |
![]() |
The factory-configured access point accepts a direct serial connection to the UI. Configure the access point for the following:
NOTE: | Configure these settings in the Set Serial Port Configuration screen within the UI. Refer to Configuring for Dial-Up to the UI. |
Assuming the UI and serial port are enabled on the access point:
emulation | ANSI |
baud rate | 19200 bps |
data bits | 8 |
stop bits | 1 |
parity | none |
flow control | none |
The access point supports a dial-up connection to the UI. This requires accessing the UI from Telnet or a direct serial connection and changing the serial port configuration. Configure the access point for the following:
Configure these settings in the Set Serial Port Configuration within the UI. Refer to Configuring for Dial-Up to the UI.
A Web Browser is a program used to view Web documents or pages. The browser retrieves the requested page, interprets its text and displays the page properly formatted on a computer screen.
Using a Web browser to gain access to the UI requires the workstation to have a TCP/IP stack and access to a web browser. The remote station can be on the wired or wireless LAN.
NOTE: | To use this feature the Web browser must support JavaScript as do Internet Explorer 4.0 and higher or Netscape. |
A network Web server is required to access the Help file from the Intel® PRO/Wireless 2011B LAN Access Point Configuration Management System web pages. This procedure applies to the Microsoft Internet Information Server. The network Web server can be different; if so, some of the procedures will differ.
NOTE: | This procedure is for Network or System Administration personnel only. |
To create the Help file on a network Web server:
NOTE: | This installation example is for Windows NT 4.0. |
NOTE: | Ensure the server WWW service is running. |
Using a Web Browser to gain access to the UI requires the workstation to have a TCP/IP stack and access to a Web browser. The remote station can be on the wired or wireless LAN.
To ensure the Web Server option is enabled for the access point:
Reset the access point for changes to take effect.
To access the access point UI using a Web Browser from a workstation:
NOTE: | The workstation, in this case, is the workstation or laptop running the Web browser. |
If the ping receives no response, verify that the hardware connections, IP address, gateway address and subnet mask are correct. If correct, contact the site System Administrator for network assistance.
Enter the IP address for the associated access point to access the access point
using a Web browser:
http://xxx.xxx.xxx.xxx
The Intel® PRO/Wireless 2011 LAN Access Point Configuration Management System displays.
NOTE: | The Web pages look different than the Telnet or Direct Serial or Dial-Up Connections. Access the different pages using the nodes located in the left frame. Refer to the online help for Web page navigation, page content and parameter use. |
To view configuration, function, or option changes on the Web page(s) turn off the caching function for the browser used.
NOTE: | If this property/option is not turned off the browser returns the previous view of the page without the changes. To ensure the latest version of a web page is viewed set this option in the browser. |
To access help from any Intel® PRO/Wireless 2011 LAN Access Point Configuration Management System web page, select the Help button always located in the top right corner of the right frame on each page.
For access to the Easy Setup and Configuration pages a popup dialog box appears.
Nothing needs to be entered for the User Name. Then enter the default Password:
Intel
NOTE: | The password is case sensitive. |
To manually terminate the session, exit the browser.
The following conventions apply:
The UI defaults to User mode that allows read-only access to the access point's functions (e.g., view statistics). To access configuration:
NOTE: | The password is case sensitive. |
If the password is correct, the access point displays the selected page.
If the password is incorrect, the
access point requests the User Name and Password again.
NOTE: | Set the System Password in the Security Setup page. |
To prevent unauthorized access, change the configuration access to the UI. This includes enabling or disabling the Telnet Logins or changing the System Password.
To change Telnet access to the access point:
To change the System Password:
A dial-up connection to gain access to the UI requires a straight-through cable between the modem and the access point. The remote PC requires a modem and a communication program (e.g. Microsoft Windows Terminal program).
NOTE: | Refer to Supported Modems for modems supported by the access point. |
To enable and configure the serial port connection on the access point:
Answer Wait Time | The time waiting for a remote connection before dropping the attempt. The default is 60 seconds from a 5 to 255 second range. |
Modem Speaker | Access point sends a command to the modem to enable/disable the modem speaker. The default is Enabled. |
Inactivity Timeout | The inactivity time on the UI that causes the access point to terminate the connection while using a modem. The default is 5 minutes from a 0 to 255 minute range. The zero (0) value indicates no time-out. |
Assuming the PPP, serial port and answer mode are enabled on the access point:
emulation | ANSI |
baud rate | 19200 bps |
data bits | 8 |
stop bits | 1 |
parity | none |
flow control | none |
To hang up from the UI while connected:
Refer to the online help file for information on Web Browser navigation and
basic functionality. For file download instructions and the associated file(s), click
here.
The access point UI includes an Easy Setup page to set basic parameters for an Intel PRO/Wireless 2011 LAN. These parameters include designating gateway addresses that provide the ability to forward messages across routers on the wired Ethernet.
To install an access point:
Unit Name | identifies the access point name |
IP Address | the network-assigned Internet Protocol address of the access point |
Gateway IP Address | IP address of a router the access point uses on the Ethernet |
Subnet Mask | The first two sets of numbers specify the network domain, the next set specifies the subset of hosts within a larger network, and the final set specifies an individual computer. These values help divide a network into sub networks and simplify routing and data transmission. The subnet mask defines the size of the subnet. |
DHCP | The access point uses DHCP to obtain a leased IP address and network configuration information from a remote server. |
Help URL | Web address of the access point Configuration Management Help file |
ESS_ID | the unique 32-character, alphanumeric, case-sensitive network identifier of the access point |
Diversity | enables selection of antenna diversity (Primary Only, On) |
Additional Gateways | The IP addresses of the additional gateways used. Access up to seven additional gateways. |
To add or modify an Additional Gateway:
The access point provides configuration options for how the unit operates including security access and interface control. Some parameters do not require modification.
Telnet Logins | Specifies if the access point accepts or rejects Telnet Logins. The default value is Enabled. |
System Password | Select Modify. For administrative access, select any alphanumeric, case-sensitive entry up to 13 characters for a password. Make the same entry for System Password and Confirm System Password. Select Save Settings. The default System Password is Intel. |
Access Control | Specifies enabling or disabling the access control feature. If enabled, the ACL (Access Control List) specifies the MAC addresses of MUs that can associate with this access point. The default is Disabled. |
Allowed Mobile Units | View/Add/Delete MU entries by individual MAC address in the Access Control List (ACL). |
Ranges of Allowed Mobile Units | View/Add/Delete MU entries by a range of MAC addresses in the Access Control List. |
Disallowed Mobile Units | View/Add/Delete MUs not allowed to associate with the access point. |
Encryption Administration | Indicates which interface can change the encryption keys and encryption key index. Any Interface allows users to change encryption keys through any interface. Serial Only allows users to change the encryption parameters only through the serial port. Default is Any Interface. |
Strong Encryption | Allows access to and use of the 128 bit encryption keys. Some countries will not have access to 128 bit encryption due to encryption export restrictions. To access the 128 bit encryption key screen contact the Intel Customer Support (http://support.intel.com) for a unique access code to enable this feature. |
WEP (Privacy) | Enables or disables the use of the WEP algorithm. The default is Disabled. |
WEP Algorithm | Defines the number of bits and type of WEP algorithm. Default is 40 bit shared key. You can also select 128 bit shared key. Note that 40-bit encryption, is also called 64-bit. |
Encryption Key | Allows the user to select the Active Key (1-4) used to transmit data packets. |
Encryption Key Setup | Select View/Modify to configure the encryption keys. For information, see Encryption Key Setup. |
This page allows the network administrator to configure the password for the access point.
System Password | Select any alphanumeric, case-sensitive entry of up to 13 characters. The characters selected are displayed as asterisks. Changing this password changes the Read/Write Community password found in the SNMP Configuration screen. The default password is Intel. |
Confirm System Password | Select the same alphanumeric, case-sensitive entry of up to 13 characters as System Password. The characters selected are displayed as asterisks. |
The WEP Algorithm determines the screen displayed, either 40 bit or 128 bit encryption. These pages are view only if Encryption Administration is Serial Only. To enable the Open System option, select Disabled for WEP (Privacy) on Security Setup.
This table shows the access point association capability with the selected WEP Algorithm.
AP Selected WEP Algorithm |
MU Selected WEP Algorithm |
Association Status |
---|---|---|
Open (disable) | Open | Associated |
Open (disable) | 40 | No Association |
Open (disable) | 128 | No Association |
40 | Open | No Association |
40 | 40 | Associated |
40 | 128 | Associated, but can't transmit data |
128 | Open | No Association |
128 | 40 | Associated, but can't transmit data |
128 | 128 | Associated |
Each 40 bit encryption key is a subset of the respective 128 bit encryption key. The first 40 bits of each encryption key is the same for the respective 40 bit and 128 bit encryption keys. When a 40 bit encryption key is changed the first 40 bits of the respective 128 bit key is also changed. Consequently, when a 128 bit encryption key is changed the first 40 bits of the 40 bit encryption key is changed. Moreover, configuring the encryption Keys using the SNMP Trap Manager overrides the Key values for the access points accessed by the SNMP Trap Manager.
Intel provides a total of four Encryption Keys. Each key enables encryption between the access point and an associated MU with the same encryption Key and Key value.
Considerable care is required when assigning keys. Keys have to be in the same order with the same value per key for the access point and MU to authenticate data transmission using encryption.
Example: An access point uses Key 1 with a value of 1011121314. The associated MU requires the same Key 1 to have the value 1011121314.
NOTE: | Some countries do not have access to the 128 bit encryption screens due to imposed encryption export restrictions. To access the 128 bit encryption screen contact Intel Customer Support (http://support.intel.com) for the unique access code to enable this feature. |
Selected Key | The default is 1. Select the appropriate radio button to change the selected Encryption Key. |
Key 1 to 4 | Four separate Encryption Keys maximum. Each key enables encryption
between the access point and an associated MU with the same encryption key
and value. Note: Keys have to be in the same order with the same value per key for the access point and MU to authenticate data transmission using encryption. Example: access point uses 40 Bit Shared Key 1 with a value of 1011121314. The associated MU requires the same Key 1 with a value of 1011121314. |
The access point provides configuration options for how the unit operates including interface control. Some parameters do not require modification.
Unit Name | Identifies the access point name. | ||||||||||||||||||
Channel | The direct sequence channel used by the access point.
|
||||||||||||||||||
Mobile IP | If enabled, this feature allows MUs to roam across routers. |
||||||||||||||||||
MU-MU Disallowed | If enabled, mobile units associated with the same access point are not allowed to communicate with each other. The default is disabled. | ||||||||||||||||||
Mobile Home MD5 Key | Select Modify to change the secret key used for Mobile-Home registration and authentication. | ||||||||||||||||||
Ethernet Timeout | Disables the radio interface if there is no activity detected on the
Ethernet line after the seconds indicated (30-255). The access point
disassociates MUs and
prevents further associations until it detects Ethernet activity again. The default is
disabled. 10-BaseT Timeout detects if the 10Base-T line goes down. If the value is Send WLAP Alive and the WLAP has connected to the Root AP, the WLAP sends a WLAP Alive BPDU on the Ethernet line every WLAP Hello Time seconds to allow WLAPs on the Ethernet line to detect its existence. If the value is Timeout WLAP Alive the WLAP tracks the WLAP Alive BPDU. If the BPDU is missing for WLAP Hello Time seconds, the WLAP state changes to WLAP Lost on Ethernet. Once the WLAP Alive BPDU is detected, the WLAP resets and starts over. When the Ethernet connection is broken, the access point clears the MU table and disables the RF interface until the Ethernet connection comes up. |
||||||||||||||||||
Agent Ad Interval | Specifies the time in seconds between the mobility agent advertisement transmissions. | ||||||||||||||||||
AP-AP State Xchg | Specifies AP-to-AP communication exchanged. If Disabled, prevents AP load leveling function. | ||||||||||||||||||
WNMP Functions | Specifies if this access point can perform WNMP functions. The default value is Enabled. | ||||||||||||||||||
Ethernet Interface | Enables or disables wired Ethernet. The default value is Enabled. | ||||||||||||||||||
RF Interface | Enables or disables radio. The default value is On. | ||||||||||||||||||
Default Interface | Specifies the default interface (Ethernet, PPP or WLAP) to which the access point forwards a frame if it cannot find the address in its forwarding database. The default interface is Ethernet. |
This page allows the network administrator to configure the secret key used for Mobile Home registration and authentication.
Mobile Home MD5 Key | Select any alphanumeric, case-sensitive entry of up to 13 characters. |
Confirm Mobile Home MD5 Key | Select the same alphanumeric, case-sensitive entry of up to 13 characters as Mobile Home MD5 Key. |
The access point auto configures most radio parameters. Only advanced users, Intel trained users, or Intel representatives should configure radio parameters for the access point. Options in the RF Setup and WLAP Setup screens fine-tune the radio functions.
BC/MC Queue Max | Determines the memory allocated for the queue used in the access point to temporarily hold broadcast/multicast messages. Unit measure is in packets and corresponds to maximum-sized Ethernet packets. The default is 10. |
Max Retries (data) | The maximum allowed retries before aborting a single data packet transmission. The default is 15. Do not modify. |
Max Retries (voice) | The maximum allowed retries before aborting a single data packet transmission. The default is 5. Do not modify. |
Multicast Mask (data) | Supports broadcast download protocols for Point-of-Sale terminals that load a new operating image over the network instead of using a local nonvolatile drive. The multicast mask for RF data packets is the top 32 bits of the MAC address and allows for a series of MAC addresses to receive multicast messages. The access point transmits these messages immediately and does not queue them for processing at DTIM intervals. | Multicast Mask (voice) | Supports broadcast, or part-line, voice communication. All multicast downstream data packets that match the top 32 bits of the multicast mask are forwarded immediately instead of being queued for transmission at the next DTIM interval. |
Beacon Interval | The time between beacons in Kilo-microseconds. The default is 100. Avoid changing this parameter because it can adversely affect PSP-mode terminal performance. |
Accept Broadcast ESS_ID | Allows the access point to respond to any station sending probe packets with the industry-standard broadcast ESS_ID. If Enabled, this feature allows industry-standard devices interoperability. The access point probe response includes the ESS_ID and information about the network. By default, this feature is Disabled and the access point responds only to stations that know the ESS_ID. This helps preserve network security. MUs require using Broadcast ESS_ID to utilize this function. |
MU Inactivity Timeout | Allows industry-standard devices interoperability by specifying the time the access point allows for MU inactivity. An Intel® PRO/Wireless 2011 LAN Access Point recognizes MU activity through data packet transmission and reception, and through scanning. Intel® PRO/Wireless 2011 LAN MUs conduct active scanning. Other industry-standard MUs might conduct passive scans and an access point can classify them as inactive. |
Rate Control (Mb/s) | Defines the data transmission rate. The defaults are:
Different combinations of the data rates can be selected as Optional, Required or Not Used; but, it is essential to set the lowest selected rate to Required. All IEEE 802.11 broadcast and management frames are sent out on the lowest required data rate. |
RTS Threshold | Request to Send threshold (256 - 2347). Allows the access point to use RTS (Request To Send) on frames longer than the specified length. The default is 2347 bytes. (Not configurable) |
Short RF Preamble | Determines whether the access point uses a short or long preamble. The preamble is
approximately 8 bytes of the packet header generated by the access point
and attached
to the packet prior to transmission. The preamble length is transmission data
rate dependant. The short preamble is 50% shorter than the long preamble. This feature is only available to version 2.0 radio hardware. Equipment without the version 2.0 radios cannot enable the short preamble function and cannot see, receive or acknowledge messages from short preamble enabled version 2.0 hardware. Disable this feature in a mixed hardware network and use the long preamble. MUs and access points are required to have the same Short RF Preamble settings for interoperability. The default is Enabled. |
The access point supports up to four WLAP interfaces. Intel recommends using one WLAP as an interface on high traffic networks and for low traffic networks no more than two WLAPs because excessive channel contention causes the WLAP to miss beacons from the Root AP shown in the example.
Refer to LED Indicators for indication of access point status. If more than two WLAPs operate in a repeater configuration, Intel recommends the WLAPs with the lowest WLAP IDs be placed on the wired network.
To avoid forming a loop, per the IEEE 802.1d Spanning Tree Protocol, the Wireless WLAP associates with only one wired WLAP.
If an access point functions as a bridge between wired LANs, Intel recommends one LAN contain the lower WLAP IDs.
To configure the access point for wireless operation:
WLAP Mode | Specifies the access point's wireless-AP operation status. Enabled, the access point sets up automatically for wireless operation. The access point can operate in any of these configurations: Wireless, Repeater or Ethernet Bridge. Disabled, no wireless operation possible. Default setting. Link Required. At power up:
|
WLAP Priority | Allows a user to determine the Root and the Designated WLAP in wireless operation. Concatenate the priority value as the most significant portion of the MAC address. An access point with a lower numerical value for priority is more likely to become the root AP. The default is 8000 hex from the 0 - 0xFFFF range. |
WLAP Manual BSS ID |
Specifies the BSS_ID of a particular WLAP and forces the
current access point to associate only with that WLAP. If setting the WLAP Manual BSS_ID to the current BSS_ID, the current access point jumps into Functional State immediately and waits for an Association Request from the other WLAP. Refer to Radio Statistics. This feature speeds up the association process and minimizes confusion when more than two WLAPs try to associate with each other. |
WLAP Hello Time | Sets the time lapse, in seconds, between Config BPDU
packets sent to the Root AP by a designated WLAP. The default is 20 seconds. If
the Root AP fails to hear from the designated WLAP within the
WLAP Max Age time, it removes the designated WLAP from its interface table. The WLAP Hello Time of the Root AP overwrites the WLAP Hello Time of designated WLAPs. The WLAP Hello Time does not refer to the time lapse between beacons sent by the Root AP. If a designated WLAP fails to receive a beacon, it knows that its Root WLAP has lost the Root status. |
WLAP Max Age | Defines time, in seconds, before discarding aged configuration messages. This causes a
disconnection between the two WLAPs. The recommended value is a multiple of the WLAP
Hello Time. The default is 100 seconds. The WLAP Max Age of the Root AP overwrites the WLAP Max Age of designated WLAPs. |
WLAP Forward Delay | Specifies the time, in seconds, to prevent an access point from forwarding data packets to and
from an interface during initialization. The WLAPs involved and the wireless operation
state, refer to Radio Statistics, affect
the WLAP Forward Delay time. This delay ensures that all WLAP
nodes are heard. The default is five seconds per wireless operation state. The WLAP Forward Delay of the Root AP overwrites the WLAP Forward Delay of designated WLAPs. |
An SNMP manager application gains access to the access point SNMP agent if it has the access point IP address. An access point can be accessed through the SNMP Trap Manager to configure settings and parameters. Intel does not recommend this process.
NOTE: | Configuring the encryption Keys using the SNMP Trap Manager overrides the Key values for the access point or access points accessed by the SNMP Trap Manager. |
NOTE: | Refer to the Intel MIB on the Intel CD for specific entries. |
The access point supports SNMP V1, MIB-II, and the INTEL.MIB.
SNMP Agent Mode | Defines the SNMP agent mode: Disabled disables SNMP functions. Read Only allows get and trap operations. Read-Write (default) allows get, set and trap operations. |
Read Only Community | User-defined password string up to 31 characters identifying users with read-only privileges. Select Modify to change. |
Read-Write Community | User-defined password up to 13 characters for users with read and write privileges. The password used matches the System Password used to gain access to the configuration screens. Select Modify to change. |
Trap Host 1 IP Address | Trap manager 1 IP address. The default is 0.0.0.0 |
Trap Host 2 IP Address | Trap manager 2 IP address. The default is 0.0.0.0 |
All SNMP Traps | Enables selected or disables all trap operations. The default value is Disable All. |
Cold Boot | Send a trap to manager when the access point cold boots. The default value is Deselected. Other choices are Trap Host 1, Trap Host 2 and Both Trap Hosts. |
Authentication Failure | Indicates that community strings other than those specified for the Read-Only Community and the Read-Write Community were submitted. The default value is Deselected. Other choices are Trap Host 1, Trap Host 2 and Both Trap Hosts. |
Radio Restart | Send a trap to manager for radio restart. The default value is Deselected. Other choices are Trap Host 1, Trap Host 2 and Both Trap Hosts. |
Access Control Violation | Send a trap to manager when an ACL violation occurs. The default value is Deselected. Other choices are Trap Host 1, Trap Host 2 and Both Trap Hosts. |
DHCP Change | If selected and enabled, this trap generates the following enterprise-specific traps:
|
WLAP Connection Change | If selected and enabled, this trap generates the following enterprise-specific traps:
|
This page allows the network administrator to configure the Read Only Community password for the access point.
Read Only Community | Select any alphanumeric, case-sensitive entry of up to 31 characters. |
Confirm Read Only Community | Select the same alphanumeric, case-sensitive entry of up to 31 characters as Read Only Community. |
This page allows the network administrator to configure the Read-Write Community password for the access point. Note that this password matches the System Password used to gain access to any System Configuration page.
Read-Write Community | Select any alphanumeric, case-sensitive entry of up to 13 characters. |
Confirm Read-Write Community | Select the same alphanumeric, case-sensitive entry of up to 13 characters as Read-Write Community. |
To use a PPP connection, choose the hardware connection, direct or modem, and verify the enabled status of serial port (default) in the PPP-Modem Setup page.
A direct null modem serial cable connection between two access points.
From the UI:
To establish the PPP port connection on both access points:
The PPP interface provides a connection using modems over a telephone line. Connect modems to the access points with straight-through serial cables. Designate one access point as the Originating AP and the other as the Answering AP. Configure the Originating AP with dial-out information to the answering access point. The answering access point waits for the originating access point to dial into it. Refer to Supported Modems for modems supported by the access point.
Dial out manually through the Special Functions menu or dial out automatically on boot.
From the originating access points UI:
PPP Interface | Enables or disables serial PPP. The default value is Disabled. |
Modem Speaker | Sends a command to the modem to turn on or off the modem speaker. The default is Enabled. |
Answer Wait Time | Time in seconds waiting for a remote connection before dropping attempt. The default is 60 from a 5 to 255-second range. |
PPP Inactivity Timeout | Controls the time out between issuing a PPP packet and expecting a reply. This is necessary if the serial connection has long delay periods. The 0 value indicates no time out. The default is 3 from a 0 to 255-second range. |
Maximum PPP Terminates | Controls the number of PPP terminate requests the access point issues when a PPP-linked access point does not respond to a terminate request. The access point closes the PPP connection after making the maximum requests. The default is 10 from a 0 to 255-terminate request range. |
From the answering access points UI:
To manually initiate dial-out from the originating access point to the answering access point:
The access point dials out and attempts to make connection according to parameters set in Port Configuration. If dial-out fails, the access point switches to manual dial-out.
For automatic dial-out:
The access point LEDs flash as if powering up and then the access point returns to a STATUS-flashing state.
To hang up:
The ACL supports adding MU entries by range of MAC addresses or by individual MAC address.
To select a range of MAC addresses:
When the Access Control option is enabled on the Security Setup page, all MUs within the range specified can associate with the access point. Specify up to eight ranges as needed or add to the ACL using individual address entries.
The Access Control List - Add/Delete Ranges of Mobile Units page provides a facility to remove ranges of MUs from the ACL.
The Access Control List - Add/Delete Allowed Mobile Units page provides a facility to add up to 512 (allowed or disallowed) MUs to the ACL.
NOTE: | Users can enter MAC addresses without colons. |
The Access Control List - Add/Delete Allowed Mobile Units page provides a facility to remove MUs from the ACL.
To switch between enable and disable locate Access Control in the Security Setup page.
The access point provides a facility to remove all MUs from the ACL.
This option from the Configuration|Special Functions menu takes all associated MUs and creates an ACL from them. This builds an ACL without having to manually enter addresses. Edit the ACL using the add and delete functions.
The access point can keep a list of MAC addresses for MUs not allowed to associate with it. The Disallowed Addresses provides security by preventing unauthorized access by known devices. Use it for preferred association of MUs to access points.
The Access Control List - Add/Delete Disallowed Mobile Units page provides a facility to add up to 512 (disallowed or allowed) MUs to the list.
NOTE: | Users can enter MAC addresses without colons. |
The Access Control List - Add/Delete Disallowed Mobile Units page provides a facility to remove MUs from the list:
Clear all disallowed MUs from the list by:
The access point clears all disallowed MUs.
Packet types supported for the type filtering function include the 16-bit DIX Ethernet types. The list can include up to 16 types.
The Filtering Setup page provides a facility to add types to the list.
The Filtering Setup page provides a facility to remove types from the list.
Set the type filters to Disabled, Forward or Discard. The default value is Disabled. To control the type filtering mode:
NOTE: | Users can only enable one type filtering option at a time. |
Clear the MU association table for diagnostic purposes. This is necessary if the access point has many MU associations no longer in use. Use this option to ensure that MUs associating with the access point are active.
To clear MUs associated with the access point:
The access point removes MUs associated with it. MUs cleared from one access point try to associate again with the access point or another nearby access point.
Options for updating the firmware:
The default files for firmware updates are DSAP_FW.BIN and intl_htm.bin.
The Ethernet TFTP upgrade method requires a connection between the access point and PC on the same Ethernet segment. Verify the PC has a TFTP server running on it. Running the server requires third party software like FTP PC/TCP for DOS or OnNet for Windows. The wireless TFTP upgrade method requires a connection between the access point and a TFTP server. The TFTP server can be running on an Intel device.
Updating the firmware requires a TFTP server running in the background.
To update the access point firmware:
NOTE: | Change this only if a new file name is desired. The defaults are DSAP_FW.BIN and intl_htm.bin unless the user changed the names. |
NOTE: | Verify the path for the file name is accurate. |
NOTE: | The WIRED LAN ACTIVITY indicator on the access point does NOT flash. |
NOTE: | To view the file transfer log, switch to the TFTP application. |
The TFTP Update ALL Access Points' option up/downgrades the firmware for all associated access points with the same ESS_ID on the same subnet and includes all recognized hardware platforms regardless of firmware version. The initiating access point is responsible for sending the correct file name for each Intel platform. The initiating access point does not send update commands to non-Intel platforms.
Users can find the specific access points that have firmware up/downgraded on the Known APs screen. The time interval between the WNMP update firmware commands for updating each access point is 2 seconds. This interval prevents more than one access point at a time from accessing the TFTP server and causing network congestion.
The Ethernet TFTP upgrade method requires a connection between the access point and PC on the same Ethernet segment. Verify the PC has a TFTP server running on it. Running the server requires third party software like FTP PC/TCP for DOS or OnNet for Windows.
The wireless TFTP upgrade method requires a connection between the access point and a TFTP server. The TFTP server can be running on an Intel device.
Updating the firmware requires a TFTP server running in the background.
To update the access point firmware:
NOTE: | Change this only if a new file name is desired. The defaults are DSAP_FW.BIN and intl_htm.bin unless the user changed the names. |
NOTE: | Verify the path for the file name is accurate. |
NOTE: | The WIRED LAN ACTIVITY indicator on the access point does NOT flash. |
NOTE: | To view the file transfer log, switch to the TFTP application. |
Users can achieve true authentication by using the MD5 algorithm with a shared key configured into the access point and its MU. MD5 is a message-digest algorithm that takes an arbitrarily long message and computes a fixed-length digest version, consisting of 16 bytes (128 bits), of the original message. Users can think of the message-digest as a fingerprint of the original message. Since the message-digest is computed using a mathematical formula or algorithm, this makes the probability of its reproduction the equivalent of two people having the same fingerprints. The message-digest is the authentication checksum of a message from a mobile MU to an access point during the Home Agent registration process. The MD5 algorithm's purpose, therefore, prevents an MU from impersonating an authenticated MU.
The access point supports several specific functions.
The access point keeps only saved configuration changes after a reset. To make configuration changes permanent, save as needed.
To save all changes to all access points:
Resetting an access point clears statistics and restores the last saved configuration information. If changes are made without being saved, the access point clears those changes on reset. If changes are never saved, a reset restores the last saved configuration.
The access point flashes its LEDs as if powering up and returns to a STATUS - flashing state.
Flashing all of the access point LEDs simultaneously allows visual confirmation of location. To start flashing the LEDs:
The access point flashes all of its LEDs on and off. The selection on the Special Functions page is Stop Flashing AP LEDs. To stop flashing the LEDs:
The access point keeps statistics of its transactions during operation. These statistics indicate traffic, transmission success and the existence of other radio network devices. Clear statistics as needed.
The System Properties screen displays information about the access point's configuration.
To view information about the access point configuration select Statistics|System Properties from the Access Point menu tree.
Information includes:
Unit Name | Identifies the access point name. |
MAC Address (BSS) | Identifies the unique 48-bit, hard-coded Media Access Control address. |
IP Address | Identifies the network-assigned Internet Protocol address. |
ESS_ID | Identifies the unique 32-character, alphanumeric, case-sensitive network identifier. |
Channel | The direct sequence algorithm used for the operating country. |
Country | Identifies access point country code that in turn determines the access point direct sequence channel and channel range. |
Diversity | Indicates whether the access point is configured for single (Primary Only) or dual antenna (On) mode. |
Rate control 11 Mb/sec 5.5 Mb/sec 2 Mb/sec 1 Mb/sec |
Defines the data transmission rate. Default is 11 and 5.5 Mb/sec Optional and 2 and 1 Mb/sec Required. |
WEP (Privacy) | Enables or disables the use of the WEP algorithm. The default is Disabled. |
WEP Algorithm | Defines the number of bits and type of WEP algorithm use. The default is 40 Bit Shared Key. |
Access Control | Specifies if the access control feature is enabled or disabled. If enabled, the ACL (Access Control List) specifies the MAC addresses of the MUs that can associate with this access point. |
CCA Mode | Clear Channel Assessment (CCA) Mode is the method used to detect transmissions from other sources. The access point uses the Carrier Sense form of CCA. |
CCA Threshold | The energy threshold or level above which the airwaves are considered busy. |
Model Number | Identifies the model number. |
Serial Number | States a unique identifier for the access point. |
Hardware Revision | Specifies the hardware version. |
Manufacture Date | Specifies the date of manufacture of the access point. |
AP Firmware Version | Specifies the firmware version. |
RF Firmware Version | Specifies the radio firmware version. |
HTML File Version | Specifies the HTML file version. |
Current MUs | Specifies the current number of MUs associated with this access point. |
Total Associations | Specifies the total MU associations handled by this access point. |
System Up Time | Specifies how long the system has been operational. |
Select Statistics|Interface from the Access Point menu tree to display the Interface Statistics screen. This screen provides:
The access point interface indicates packets sent to the AP protocol stack (e.g. configuration requests, SNMP, Telnet).
Select Statistics|Forwarding Counts from the Access Point menu tree to display the Forwarding Counts screen. Forwarding Counts provides information on packets transmitted from one interface to another (Ethernet, PPP, RF(radio), AP). Forwarding Counts also displays the broadcast packets transmitted from the access point.
The access point keeps Ethernet performance statistics including packet transmission and data retries until reset. The display also includes information used only by Intel Customer Support.
Select Statistics|Ethernet from the Access Point menu tree.
Displayed for ethernet statistical units:
Packets Seen | packets received on Ethernet interface |
Packets Forwarded | packets forwarded from Ethernet interface to other interfaces |
Discarded/NoMatch | packets discarded because of unknown destinations (destinations not in the known list of database entries) |
Discarded/Forced | packets discarded because of the applied address filters |
Discarded/Buffer | packets discarded because insufficient buffers in access point |
Discarded/CRC | packets discarded because of data errors |
Broadcast/Multicast | total broadcast or multicast packets received |
Individual Address | packets received with designated individual addresses |
Packets Sent | total packets sent out |
Any Collision | packets affected by at least one collision |
1 + Collisions | packets affected by more than one collision |
Maximum Collisions | packets affected by the maximum number of collisions |
Late Collisions | collisions occurring after the first 64 bytes |
Defers | the times the access point had to defer transmit requests on the Ethernet because of a busy medium |
To update the values once select Ethernet again.
To have the access point automatically update the display every five seconds select
Start Refresh.
The access point keeps radio performance statistics including packet and communication information.
To view RF statistics, select Statistics|RF from the Access Point menu tree.
Radio performance statistics include:
Data Packets Sent | total data packets transmitted |
Encrypted Packets Sent | total encrypted packets transmitted |
Data Bytes Sent | total data packets transmitted in bytes |
BC/MC Packets Sent | broadcast/multicast user data packets successfully transmitted |
BC/MC Bytes Sent | broadcast/multicast user data bytes successfully transmitted |
System Packets Sent | system packets successfully transmitted |
SBC/MC Packets Sent | broadcast/multicast system packets successfully transmitted |
Successfully Transmitted Fragmented Packets | fragmented packets successfully transmitted |
Unsuccessfully Transmitted Fragmented Packets | fragmented packets unsuccessfully transmitted |
Fragments Sent | packet fragments transmitted |
Packets without Retries | transmitted packets not affected by retries |
Packets with Retries | transmitted packets affected by retries |
Packets with Maximum Retries | transmitted packets affected by the maximum limit of retries |
Total Retries | retries occurring on the interface. A retry occurs if the device fails to receive an acknowledgment (ACK) from a destination. |
Data Packets Received | total data packets received |
Encrypted Packets Received | total encrypted packets received |
Data Bytes Received | total data packets received in bytes |
BC/MC Packets Received | broadcast/multicast user data packets successfully received |
BC/MC Bytes Received | broadcast/multicast user data bytes successfully received |
System Packets Received | system packets successfully received |
SBC/MC Packets Received | broadcast/multicast system packets successfully received |
Successfully Reassembled Fragmented Packets |
packets successfully reassembled |
Unsuccessfully Reassembled Fragmented Packets |
packets unsuccessfully reassembled |
Fragments Received | packet fragments received |
Received Duplicate Packets | duplicate packets received by the access point. This indicates the access point sent an ACK, but the MU didn't receive it and transmitted the packet again. |
Undecryptable Packets | total data packets that could not be decrypted |
Received CRC Errors | packets received that contained CRC (Cyclic Redundancy Check) errors. An MU transmitted a corrupt data packet and failed to pass the CRC verification. Ensure that any acknowledgment of the data packet contains the correct CRC word. An incorrect CRC causes the access point to discard the data packet. |
Received ICV Errors | packets received that contained ICV (Identity Check Value) errors. An MU transmitted a corrupt data packet and failed to pass the ICV verification. Ensure that any acknowledgment of the data packet contains the correct ICV checksum. |
To update the values once select RF again.
To have the access point
automatically update the display every five seconds select Start Refresh.
The access point keeps wireless access point performance statistics including packet and communication information.
To view Wireless AP statistics select Statistics|Wireless AP from the Access Point menu tree.
Wireless AP performance statistics include:
Current # WLAP Interfaces | Refers to the current Wireless access point interfaces in use from a 1-4 range. |
Current State | On initialization, the access point can be in any of the following states of wireless operation:
Quick Wireless AP Setup provides an explanation of a Root AP. |
Priority | States the WLAP priority value assigned to the access point. See Configuring Radio Parameters. |
Root Interface | States the interface leading to the Root AP |
Root Priority | States the priority value of the Root AP |
Root IEEE Address | States the MAC address of the Root AP |
Root Path Cost | Indicates the hops between the current WLAP and the Root AP |
The Wireless AP interface table shows for each interface:
Itf ID | Identifies the wireless interface on which this access point communicates with another. |
WLAP Interface IEEE Address | States the MAC address of the associated WLAP. |
Interface State | Identifies the state of the interface from:
|
Path Cost | An abstract unit added to the Root Path Cost field in the Config BPDU received on this interface. The unit represents a hop on the path to the Root AP. |
Designated Root ID | An ID designated by the Root AP. Access points in WLAP mode negotiate the position of Root AP at power up. The access point with the lowest Root ID, path and WLAP ID becomes the Root AP. Both the Root ID and the WLAP ID are 16-digit numbers. The first 4 digits represent the Priority value and the remaining 12 digits represent the MAC address of the access point. |
Designated Cost | A path cost designated by the Root AP. |
Designated WLAP ID | A WLAP ID assigned by the Root AP. |
Designated Itf ID | An Itf ID assigned by the Root AP. |
To update the values once reselect Wireless AP again.
To have the access point automatically update the display every five seconds select
Start Refresh.
The access point keeps statistics on WNMP and SNMP packets, filtering violations, serial port use, and mobile IPs. The Miscellaneous Statistics screen shows grouped statistics.
Echoes | echo requests received by the access point |
Pings | ping requests received by the access point |
Passthrough Echoes | echoes for MUs associated with the access point |
Requests | configuration requests received from the SNMP manager |
Traps | access point messages sent to the SNMP manager |
ACL Violations | attempts by MU, not in ACL list to associate with this access point |
Address | packets discarded by address filter |
Type | packets discarded by type filter |
Number of Dialouts | dial out attempts by the access point |
Dialout Failures | dial out failures by the access point |
Number of Answers | answer attempts by the access point |
Current Call Time | current connection session length in seconds |
Last Call Time | last connection session length in seconds |
Agent Ad Sent | number of agent advertisements sent from this access point |
Registration Request Received | number of mobile IP registration requests received |
Registration Reply Sent | number of mobile IP registration replies sent |
The access point keeps statistics for individual channels (frequencies). These identify channels that have difficulty transmitting or receiving due to retries.
To view statistics for individual channels:
The access point keeps statistics of packets with multiple retries. Use these statistics to identify severe occurrences of retries. Retries occur when the transmitting station fails to receive an acknowledgment for a transmitted packet. This lack of acknowledgment can result from:
Any one of these results causes both devices to back off and retry at random times. Too many retries can indicate a system problem.
To view retry severity:
This display shows a list of the known access points derived from AP-to-AP communication. The list includes the MAC and IP addresses and configuration information for each access point. The first access point on the list is the access point providing the information. Other access points listed in subsequent lines are recognized by the access point. A broadcast message to access points every 12 seconds determines this list.
NOTE: | The TFTP update ALL Access Points' Firmware and/or TFTP update ALL Access Points' HTML File functions in Configuration|Firmware configure firmware and HTML File for each access point shown in the Known APs menu. Users can perform these options only among the same hardware platforms and firmware version. |
Select Statistics|Known APs from the Access Point menu tree.
The access point displays for each known access point:
MAC Address | The unique 48-bit, hard-coded Media Access Control address, is also known as the station identifier of the device. |
IP Address | The network-assigned Internet Protocol address |
Channel | The direct sequence channel used by the access point. |
MUS | The MUs associated with the access point. |
KBIOS | The data traffic handled by the access point in kilobytes in and out per second. |
Firmware | The firmware version used by the access point. |
Away | Determines if the access point is a functional part of the network or away. Away indicates the last known transmission took place 12 or more seconds. |
Mobile Units statistics provide information on MUs associated with the access point. These include information on data sent and received, activity and association. An MU shows only in the Home/Foreign Agents screens when an MU has roamed to another access point on a different subnet. Once an MU has roamed, the MU IP Address displays on the Home Agents screen of the MU "home" access point with the IP Address of the Foreign Agent to tell the "home" access point where to forward packets.
The MU IP Address is also shown in the Foreign Agents table and Known Mobile Units screens of the new "foreign" access point to tell the new access point where to expect packets from for newly associated MUs. The AP Known Mobile Units screen shows only the MUs associated "locally" on the same subnet.
Select Mobile Units|Known Mobile Units
from the Access Point menu tree. The display shows the currently associated MUs listed by
MAC address. An entry in the list appears as follows:
addr [p:i#eV]
where:
addr | MU's MAC address in xx:xx:xx:xx:xx:xx format |
p | MU's power mode: P for PSP, C for CAM. An unassociated MU does not display any character. |
i | MU location on access point interfaces. R for radio, P for PPP. MUs with an A were associated with the access point in the past, but no longer associate with it at time of verifying status. |
# | Access points current Radio transmit rate for the messages sent to the MU. (1, 2, 5 for 5.5, and 11) |
e | Encryption is enabled for this mobile unit. |
V | Indicates an Intel Voice enabled device. |
To update the known MUs automatically select Start Refresh.
To bring up more detailed information on an MU, select Stats to the right of the listing.
Information displayed includes:
Interface | The access point interface shows the MU connection (RF, Ethernet, PPP or AP) |
State | The connection state between the access point and the MU:
|
Power Mode | The MU power mode (CAM, PSP or N/A). |
Station ID | The IEEE 802.11 specification requires that each access point assign a station ID to all associated MUs, regardless of the MU power mode (PSP or CAM). |
Begin Current Association | The time the current association begins in hours, minutes and seconds. |
Supported Rates | Data transmission rates the station supports. |
Current Transmit Rate | The current rate the access point transmits data to the station. |
Priority | Indicates whether the MU is a voice or data type device. Voice indicates packet delivery is high priority. Normal indicates packet delivery in not time critical. |
Encryption | MU encryption support: On or Off. |
Packets Sent | The packets sent by the access point to the MU. |
Packets Received | The packets received by the access point from the MU. |
Bytes Sent | The bytes sent by the access point to the MU. |
Bytes Received | The bytes received by the access point from the MU. |
Discard Pkts/CRC | The packets discarded because of data error. |
Last Activity | The time in hours, minutes and seconds since the last communication with the MU. |
Last Data Activity | The time in hours, minutes and seconds since the last data transfer. |
Home Agents and Foreign Agents display the mapping of MUs to mobility agents. Refer to Roaming Across Routers.
To clear statistics:
The access point zeroes all statistics.
NOTE: | Resetting the access point also clears statistics. |
Access point installation includes connecting the access point to the wired network, attaching antennas, access point placement and power up. Installation procedures vary for different environments.
Before installing the access point verify the following:
Check package contents for:
NOTE: | Report missing or malfunctioning items to Intel Customer Support. |
Verify the access point model indicated on the bottom of the unit and packaging.
The minimum installation requirements for a single-cell, peer-to-peer network are:
The access point supports a 10Base-T unshielded twisted pair (UTP) standard. Users can order a null-modem cable, part number 61383-00-0, for direct serial connections by contacting an Intel sales representative.
NOTE: | Use and test the radio network with an MU. |
Locate connectors for Ethernet and power on the back of the access point.
Ethernet configurations vary according to the environment. Determine the Ethernet wiring to connect the access point, 10/100 Base-T or single cell.
NOTE: | The site survey determines the number of access points to install and their location. |
Use a 10Base-T connection for an access point attached to a wired UTP Ethernet hub. Normal 10Base-T limitations apply.
The single-cell connection option allows a single access point to bridge MUs without a wired network. MUs appear as peers as in any Ethernet environment.
Access point antenna coverage resembles lighting in that an area lit from far away might not be bright enough. An area lit sharply with few lights minimizes coverage and creates dark areas where no light exists. Even access point placement (like even placement of light bulbs) provides even, efficient coverage.
Place an access point using the following guidelines:
The dual antenna assembly provides diversity that can improve performance and signal reception.
Intel continues to add antenna options for Intel® PRO/Wireless 2011 LAN devices. Contact an Intel sales representative for available antenna options.
NOTE: | A BIAS-T system can also be used to combine low-voltage DC with Ethernet data in a single cable connecting to an access point. |
The access point rests on a flat surface or attaches to a wall, or any hard, flat, stable surface. Use the standard-mounting kit provided with the Intel® PRO/Wireless 2011 LAN Access Point.
Choose one of the options based on environment.
Resting flat | Rests on the four rubber pads on the underside of the access point. Place on a surface clear of debris and away from traffic. |
Attaching on the wall | Rests on screws. Orient the access point in a downward position on the wall so the LEDs face the floor. |
The power adapter connects to the rear of the access point and to a power outlet.
The access point works without user intervention after setup. Refer to the access point LED indicators to verify that the unit operates properly.
The top panel LED indicators provide a status display indicating power and activity. The indicators are:
![]() |
Power | Flashing indicates access point initialization. Steady Green during operation. |
![]() |
Wired LAN Activity | Flashing indicates data transfers on wired connection. |
![]() |
Wireless LAN Activity | Flickering indicates beacons and data transfers with MUs. |
When in the WLAP mode this chart signifies the access points LED indicator status. For the IEEE 802.11 protocol and access points using firmware version 4.00-20 or above only.
LED | State |
---|---|
Status | Blinks |
Wired LAN Activity | Blinks if activity occurs |
Wireless LAN Activity | Off |
LED | State |
---|---|
Status | On |
Wired LAN Activity | Off |
Wireless LAN Activity | Blinks slowly |
LED | State |
---|---|
Status | On |
Wired LAN Activity | Off |
Wireless LAN Activity | Blinks slowly |
LED | State |
---|---|
Status | Blinks regularly |
Wired LAN Activity | Blinks if activity occurs |
Wireless LAN Activity | Blinks slowly |
LED | State |
---|---|
Status | Blinks regularly |
Wired LAN Activity | Blinks if activity occurs |
Wireless LAN Activity | Blinks if activity occurs |
Special cases:
LED | State |
---|---|
Status | On |
Wired LAN Activity | Off |
Wireless LAN Activity | Blinks slowly |
LED | State |
Status | On |
Wired LAN Activity | Blinks slowly |
Wireless LAN Activity | Off |
Check the following symptoms and their possible causes before contacting the Intel Customer Support.
Ensure wired network is operating.
Verify access point operation:
Identify wired network problems:
Refer to MU documentation for installing drivers, client software and testing. Use the default values for the Net_ID (ESS_ID) and other configuration parameters until network connection verification.
MUs attach to the network and interact with the access point transparently.
Typeface conventions used include.
<angles> | indicates mandatory parameters in a given syntax. |
[brackets] | for command line, indicates available parameters; in configuration files brackets act as separators for options. |
GUI Screen text | indicates the name of a control in a GUI-based application. |
Italics | indicates the first time a term is used, a book title, and menu titles. |
This document uses the following for certain conditions or types of information:
NOTE: | Indicates tips or special requirements. |
CAUTION: | Indicates conditions that can cause equipment damage or data loss. |
Copyright © 2002 Intel Corporation. Legal Information