interoperability report ascom i62 ruckus wireless, …...interoperability report - ascom i62 –...
TRANSCRIPT
-
Interoperability Report - Ascom i62 – Ruckus Wireless 1 2016-09-15
INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, T300, R310, R500, R600, R710 and ZF7372, ZF7982 access points i62 and OEM derivatives version 5.5.0
Ruckus wireless version 9.13.0.0.232
Ascom, Gothenburg
August 2016
[ ]
-
Interoperability Report - Ascom i62 – Ruckus Wireless 2 2016-09-15
TABLE OF CONTENT: INTRODUCTION ........................................................................................................................... 3
About Ascom ............................................................................................................................ 3 About Ruckus Wireless ............................................................................................................. 3
SITE INFORMATION .................................................................................................................... 4 SUMMARY .................................................................................................................................... 5
Known issues ............................................................................................................................ 6 Compatibility information .......................................................................................................... 6 General conclusion ................................................................................................................... 6
APPENDIX A: TEST CONFIGURATIONS .................................................................................... 7 Ruckus Wireless ZD 3000 version 9.13.0.0.232 ....................................................................... 7
Security settings (PSK) ......................................................................................................... 8 Security settings (802.1X / PEAP-MSCHAPv2) .................................................................. 10 General settings (QoS, Radio) ............................................................................................ 13 CLI commands .................................................................................................................... 15
Innovaphone IP6000 (IP PBX) ................................................................................................ 18 APPENDIX B: DETAILED TEST RECORDS .............................................................................. 19
-
Interoperability Report - Ascom i62 – Ruckus Wireless 3 2016-09-15
INTRODUCTION This document describes necessary steps and guidelines to optimally configure Ruckus wireless platform with Ascom i62 VoWiFi handsets.
The guide should be used in conjunction with both Ruckus and Ascoms configuration guide(s).
About Ascom Ascom Wireless Solutions (www.ascom.com/ws) is a leading provider of innovative communication solutions providing integrated workflow intelligence for hospitals, senior care, and independent living, and other business areas where mission-critical communication is essential. Approximately 100 000 systems are installed globally. The company offers a broad range of voice and professional messaging solutions, creating value for customers by supporting and optimizing their mission-critical communication processes. The solutions are based on Cellular, VoWiFi, IP-DECT, Nurse call and Paging technologies, smartly integrated via Ascom Unite into existing enterprise systems. The company has subsidiaries in 13 countries and 1,200 employees worldwide. Founded in 1955 and based in Göteborg, Sweden, Ascom Wireless Solutions is part of the Ascom Group, listed on the Swiss Stock Exchange (ASCN:SIX).
About Ruckus Wireless The Ruckus ZoneFlex system is a centrally managed WLAN system comprising of controllers and a variety of 802.11 a/b/g/n APs. There are two unique features in the ZoneFlex product that enhance voice communications. One is BeamFlex, our smart beamforming antennas, and the second is SmartCast, our traffic management engine. Combining a compact internal antenna array with expert control software, BeamFlex continuously ranks the antenna configurations for each receiving device and reconfigures itself in real-time to bypass interference and physical barriers. SmartCast provides automatic flow classification, software pre-queuing per station and per packet scheduling of traffic over the smart antenna array. It applies heuristics to automatically classify voice packets and place them in the right queue.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 4 2016-09-15
SITE INFORMATION
Test Site: Ascom US 300 Perimeter park drive Morrisville, NC, US-27560 USA Participants: Karl-Magnus Olsson, Ascom HQ, Gothenburg Sweden TEST TOPOLOGY
-
Interoperability Report - Ascom i62 – Ruckus Wireless 5 2016-09-15
SUMMARY Please refer to Appendix B for detailed results. WLAN Controller Features
High Level Functionality Result Association, Open with No Encryption OK Association, WPA2-PSK, AES Encryption OK Association, PEAP-MSCHAPv2 Auth., AES Encryption OK Association, Multiple ESSIDs OK Beacon Interval and DTIM Period OK Preauthentication N/A PMKSA Caching OK WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK Active Mode (load test) OK 802.11 Power-save mode OK 802.11e U-APSD OK 802.11e U-APSD (load test) OK Roaming
High Level Functionality Result Roaming, Open with No Encryption OK (Typical roaming time 23ms)* Roaming, WPA2-PSK, AES Encryption OK (Typical roaming time 50ms)* Roaming, PEAP-MSCHAPv2 Auth, AES Encryption OK (Typical roaming time 49ms)* /** *) Average roaming times are measured using 802.11an. Refer to Appendix B for detailed test results * *) Measured times is with opportunistic/proactive Key Caching enabled (default enabled)
-
Interoperability Report - Ascom i62 – Ruckus Wireless 6 2016-09-15
Known issues
- Note that the “qtime” settings described in the “CLI settings” section is necessary for optimal battery life.
For additional information regarding the known issues please contact [email protected] or [email protected]
Compatibility information A full test round was performed on ZF7982, 7372, R310, R500 an R700. Access points T300 and R600 were not specifically tested but are fully supported given chipset similarities etc. All test were done with a ZD3000 controller. We ensure compatibility/interoperability with all the access points and controllers listed below given that they run the software tested. i62 version 5.5.0 is using WLAN driver version 3.6.h Supported access ports with Ruckus Wireless version 9.13.1.0.232: ZoneFlex 7372, 7982 T300, R310, R500, R600, 710 Supported controller platforms with Ruckus Wireless version 9.13.1.0.232: ZoneDirector 1100/1200 ZoneDirector 3000 ZoneDirector 5000
General conclusion All test cases including association, roaming and call stability all produced good results. Roaming times with were in the range of 40-50ms for both WPA2 PSK and .1X authentication (with OKC). The outcome of the load test was in general acceptable. In both active and U-APSD mode it was possible to keep up 12 simultaneously calls per AP radio.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 7 2016-09-15
APPENDIX A: TEST CONFIGURATIONS
Ruckus Wireless ZD 3000 version 9.13.0.0.232 In the following chapter you will find screenshots and explanations of basic settings in order to get a Ruckus WLAN system to operate with an Ascom i62. Please note that security settings were modified according to requirements in individual test cases.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 8 2016-09-15
Security settings (PSK)
- Example of how to configure the system for PSK (WPA2-AES)
-
Interoperability Report - Ascom i62 – Ruckus Wireless 9 2016-09-15
Make sure Proxy ARP is enabled.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 10 2016-09-15
Security settings (802.1X / PEAP-MSCHAPv2) Example of how to configure the system for .1X authentication
AAA server dashboard. In the example one Radius servers configured (Interop). See next picture for configuration of the profile “Interop”.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 11 2016-09-15
The IP address and the secret must correspond to the IP and the credential used by the Radius server.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 12 2016-09-15
Configuration of ESS profile for utilization of 802.1X authentication. Authentication server “Interop” corresponds to the server configured in previous step. Note. Depending on which Authentication method used it might be necessary to add a certificate into the i62. PEAP-MSCHAPv2 requires a CA certificate and EAP-TLS requires both a CA certificate and a client certificate. Server certificate validation can be overridden in version 4.1.12 and above per handset setting. Note. Refer to the i62 section in Appendix A for matching handset configurations.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 13 2016-09-15
General settings (QoS, Radio)
Access points dashboard showing configured access points.
Access points dashboard showing configured access points (continued)
-
Interoperability Report - Ascom i62 – Ruckus Wireless 14 2016-09-15
Ascom recommended settings for 802.11b/g/n are to only use only channel 1, 6 and 11. Note that in this example the TX power and channel has been modified for test purpose. General guidelines when deploying Ascom i62 handsets in 802.11a/n/ac environments:
1. Enabling more than 8 channels will degrade roaming performance. Ascom recommends against going above this limit.
2. Using 40 MHz channels (or “channel-bonding”) will reduce the number of non-DFS* channels to two in ETSI regions (Europe). In FCC regions (North America), 40MHz is a more viable option because of the availability of additional non-DFS channels. The handset can co-exist with 40MHz stations in the same ESS.
3. Ascom do support and can coexist in 80MHz channel bonding environments. The recommendations is however to avoid 80MHz channel bonding as it severely reduces the number of available non overlapping channels.
4. Make sure that all non-DFS channel are taken before resorting to DFS channels. The handset can cope in mixed non-DFS and DFS environments; however, due to “unpredictability” introduced by radar detection protocols, voice quality may become distorted and roaming delayed. Hence Ascom recommends if possible avoiding the use of DFS channels in VoWIFI deployments.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 15 2016-09-15
*) Dynamic Frequency Selection (radar detection)
CLI commands DTIM DTIM 5 value is recommended in order to allow maximum battery conservation without impacting the quality. Using a lower DTIM value is possible but will reduce the standby time slightly.
- First find the WLAN number in your system:
get wlanlist rkscli: get wlanlist name status type wlanID radioID bssid ----------------------------------------------------------- wlan0 up AP wlan0 0 00:1d:2e:02:79:09 wlan1 up AP wlan1 0 00:1d:2e:42:79:09 Then apply the setting to all voice WLANs.
set dtim-period wlan0 5 set dtim-period wlan1 5 The dtim-period setting can be done either by SSH to each access point or via the controller to all access points with the command below.
debug#remote_ap_cli -A set dtim-period wlan0 5 debug#remote_ap_cli -A set dtim-period wlan1 5
Qtime To increase the battery standby time Ascom and Ruckus recommends that the qtime parameter is adjusted. This will increase the standby time from ~40hours to ~100hours.
- Apply setting to the desired radio (2.4/5GHz) or both: set mq wifi0 qtime 2000 2000 4000 4000 set mq wifi1 qtime 2000 2000 4000 4000 The qtime setting can be done either by SSH to each access point or via the controller to all access points with the command below.
debug#remote_ap_cli -A set mq wifi0 qtime 2000 2000 4000 4000 debug#remote_ap_cli -A set mq wifi1 qtime 2000 2000 4000 4000
-
Interoperability Report - Ascom i62 – Ruckus Wireless 16 2016-09-15
Ascom i62 Recommended i62 setting.
Network settings for WPA2-PSK
-
Interoperability Report - Ascom i62 – Ruckus Wireless 17 2016-09-15
Network settings for .1X authentication (PEAP-MSCHAPv2)
If 802.1X Authentication is used a root certificate has to be uploaded to the phone by “right clicking” - > Edit certificates. EAP-TLS will require both a CA and a client certificate. Note that both a CA certificate and a client certificate are needed for TLS. Otherwise only a CA certificate is needed. Server certificate validation can be overridden in version 4.1.12 and above per handset setting.
-
Interoperability Report - Ascom i62 – Ruckus Wireless 18 2016-09-15
Innovaphone IP6000 (IP PBX) The Innovaphone IP6000 was configured with a static IP. Signaling is less relevant here since testing homes in on interoperability in relation to the WLAN infrastructure and not features of the IP PBX. During the tests the IP6000 also was used as DHCP server. IP6000 configuration: See attached file (complete-IP6000-08-03-a6.txt) for IP6000 configuration
-
Interoperability Report - Ascom i62 – Ruckus Wireless 19 2016-09-15
APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 17 Fail 0 Comments 0 Untested 4 Total 21 See attached file (WLANinteroperabilityTestReport_Ruckus_9_13.xls) for detailed test results. Please refer to the test specification for WLAN systems on Ascom’s interoperability web page for explicit information regarding each test case. See URL (requires login): https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability
-
Interoperability Report - Ascom i62 – Ruckus Wireless 20 2016-09-15
Document History Rev Date Author DescriptionP1 2016-09-01 SEKMO Draft 1. Ruckus ZD 9.13.0.0.232 R1 2016-09-13 SEKMO Review and correction. Revision 1.
WLAN TR
WLAN Interoperability Test ReportWLAN configuration:
Beacon Interval: 100ms
Test object - Handset:DTIM Interval: 5
Ascom i62 5.5.0802.11d Regulatory Domain: World
Test object - WLAN system:WMM Enabled (Auto/WMM)
Ruckus Smartzone 9.13.0.0.232No Auto-tune
AP R710,R500, R310, ZF7982, ZF7372R710R500R31079827372Single Voice VLAN
2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz
Test CaseDescriptionVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictComment
TEST AREA ASSOCIATION / AUTHENTICATION
#101Association with open authentication, no encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS
#107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS
#110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFreeRADIUS server; RootCA loaded to device; Handset autheticates twiceFAIL
#116Association with EAP-TLS authenticationPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFreeRADIUS server; RootCA and clients certificate loaded to device
TEST AREA POWER-SAVE AND QOSPASS
#150802.11 Power-save modePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFAIL
#151Beacon period and DTIM intervalPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSOny DTIM 1, 5 tested due to configuration via CLI. Beacon Period 100tuNOT TESTED
#152802.11e U-APSDPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSSee Comment
#202WMM prioritizationPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSiperf used to generate backgound load.
TEST AREA "PERFORMANCE"
#308Power-save mode U-APSD – WPA2-PSKPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS12hs ok on one single radio. Note that 12 was not the limit.
#310CAC - TSPECNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED
TEST AREA ROAMING AND HANDOVER TIMES
#401Handover with open authentication and no encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSAVG roaming time 11an: 23 ms, bgn: 23ms (No significant difference seen in roaming times between different AP models)
#404Handover with WPA2-PSK auth and AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSAVG roaming time 11an:50ms, bgn:56 ms (No significant difference seen in roaming times between different AP models)
#408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSAVG roaming time 11an: 49 ms, bgn: 55ms (No significant difference seen in roaming times between different AP models)
#411Handover using PMKSA and opportunistic/proactive key cachingPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSOKC always on. Same test as #408
TEST AREA BATTERY LIFETIME
#501Battery lifetime in idleNOT TESTEDNOT TESTEDPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED80-95hours. DTM 5. Non-DFS channels only. QTIME had to be changed for optimal battery life
#504Battery lifetime in call with power save mode U-APSDPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS10-13h, Non-DFS channels, DTIM 5, Qtime optimized
TEST AREA STABILITY
#602Duration of call – U-APSD modePASSPASSPASSPASSPASSPASSPASSPASSPASSPASS1h+ call maintained
TEST AREA 802.11n
#801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED
#802Frame aggregation A-MPDUPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSUplink and downlink.
#80440Mhz channelsNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDonly 20MHz channel width tested on 2.4GHz band
#805802.11n ratesPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSUplink and downlink.
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2016.09.13 15:34:07 =~=~=~=~=~=~=~=~=~=~=~=show techsupport
System Overview:
Name= ruckus
IP Address= 192.168.0.18
MAC Address= 00:22:7F:0C:38:7A
Uptime= 34d 6h 2m
Model= ZD3025
Licensed APs= 25
Serial Number= 320833000446
Version= 9.13.0.0 build 232
Devices Overview:
Number of APs= 1
Number of Client Devices= 8
Number of Rogue Devices= 85
Usage Summary:
Usage of 1 hr:
Max. Concurrent Users= 8
Bytes Transmitted= 20.09M
Number of Rogue Devices= 85
Usage of 24 hr:
Max. Concurrent Users= 9
Bytes Transmitted= 648.50M
Number of Rogue Devices= 98
Memory Utilization:
Used Bytes= 65228(kB)
Used Percentage= 7%
Free Bytes= 966264(kB)
Free Percentage= 93%
Protocol Mode= IPv4-Only
Device IP Address:
Mode= Manual
IP Address= 192.168.0.18
Netmask= 255.255.255.0
Gateway Address= 192.168.0.50
Primary DNS=
Secondary DNS=
Management VLAN:
VLAN ID= 1
Country Code:
Code= United States
Identity:
Name= ruckus
Session Statistics:
Enable= false
Limited Unauthorized Session= true
NTP:
Status= Enabled
Address= ntp.ruckuswireless.com
Timezone= GMT
Log:
Status= Disabled
Address=
Facility=
Priority=
AP Facility=
AP Priority=
event log level= 3
Tunnel MTU:
Tunnel MTU= 1500
Bonjour Service:
Status= Enabled
Telnet Server:
Status= Disabled
FTP Server:
Status= Enabled
Anonynous Status= Disabled
FlexMaster:
Status= Disabled
Address=
Interval= 15
login warning:
Status= Disabled
content= "Warning, you are logging into device for authorized user only. If you are not an authorized user, please click Quit; otherwise click Continue to login."
AAA:
ID:
1:
Name= Local Database
Type= Local
2:
Name= Guest Accounts
Type= Guest
3:
Name= Interop
Type= RADIUS server
Auth Method= pap
Primary RADIUS:
IP Address= 192.168.0.2
Port= 1812
Secret= ********
Secondary RADIUS:
Status= Disabled
Retry Policy:
Request Timeout= 3 Seconds
Max. Number of Retries= 2 Times
DHCP servers for DHCP relay agent:
Administrator Name/Password:
Name= admin
Password= ********
Authenticate:
Mode= Authenticate using the admin name and password
Management ACL:
AP:
ID:
1:
MAC Address= f8:e7:1e:01:9a:a0
Model= r500
Approved= Yes
Device Name= RuckusAPR500
Description=
Location=
GPS=
CERT = Normal
Bonjour-policy=
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= 165)
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 80
Channel= 36
WLAN Services enabled= Yes
Tx. Power= -6dB(1/4)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 11
WLAN Services enabled= Yes
Tx. Power= -6dB(1/4)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= DHCP
IP Address= 192.168.0.171
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Auto Configuration
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
LLDP:
Status = Use Parent Setting
Venue Name List:
2:
MAC Address= f8:e7:1e:0d:4f:70
Model= r310
Approved= Yes
Device Name= RuckusAP R310
Description=
Location=
GPS=
CERT = Normal
Bonjour-policy=
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 149
WLAN Services enabled= Yes
Tx. Power= -6dB(1/4)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 11
WLAN Services enabled= Yes
Tx. Power= -6dB(1/4)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= DHCP
IP Address= 192.168.0.193
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Auto Configuration
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
LLDP:
Status = Use Parent Setting
Venue Name List:
3:
MAC Address= 58:b6:33:3b:56:60
Model= r710
Approved= Yes
Device Name= RuckusAP R710
Description=
Location=
GPS=
CERT = Complex
Bonjour-policy=
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 149
WLAN Services enabled= Yes
Tx. Power= -7dB
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 6
WLAN Services enabled= Yes
Tx. Power= -7dB
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= DHCP
IP Address= 192.168.0.226
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Auto Configuration
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
LLDP:
Status = Use Parent Setting
Venue Name List:
PoE Mode= Auto
802.3af PoE Tx. chain= 2
5:
MAC Address= 24:c9:a1:04:21:60
Model= zf7372
Approved= Yes
Device Name= AP7300
Description=
Location=
GPS=
CERT = Complex
Bonjour-policy=
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 36
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 6
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= DHCP
IP Address= 192.168.0.170
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Auto Configuration
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
LLDP:
Status = Use Parent Setting
Venue Name List:
LAN Port:
0:
Interface= eth0
Dot1x= None
LogicalLink= Down
PhysicalLink= Down
Label= 10/100 LAN1
1:
Interface= eth1
Dot1x= None
LogicalLink= Up
PhysicalLink= Up 100Mbps full
Label= 10/100/1000 PoE LAN2
6:
MAC Address= 2c:e6:cc:1f:6a:50
Model= zf7982
Approved= Yes
Device Name= AP7900
Description=
Location=
GPS=
CERT = Complex
Bonjour-policy=
Group Name= System Default
Channel Range:
A/N= 36,40,44,48,149,153,157,161 (Disallowed= )
B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )
Radio a/n:
Channelization= 40
Channel= 44
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Radio b/g/n:
Channelization= 20
Channel= 1
WLAN Services enabled= Yes
Tx. Power= -9dB(1/8)
WLAN Group Name= Default
Call Admission Control= 10% airtime usage limit
SpectraLink Compatibility= Disabled
Override global ap-model port configuration= No
Network Setting:
Protocol mode= Use Parent Setting
Device IP Settings= Keep AP's Setting
IP Type= DHCP
IP Address= 192.168.0.198
Netmask= 255.255.255.0
Gateway= 192.168.0.50
Primary DNS Server=
Secondary DNS Server=
Device IPv6 Settings= Keep AP's Setting
IPv6 Type= Auto Configuration
IPv6 Address= fc00::1
IPv6 Prefix Length= 7
IPv6 Gateway=
IPv6 Primary DNS Server=
IPv6 Secondary DNS Server=
Mesh:
Status= Disabled
LLDP:
Status = Use Parent Setting
Venue Name List:
Smart Redundancy:
Status= Disabled
Peer IP/IPv6 Address=
Shared Secret=
IPv4 Management Interface:
Status= Disabled
IP Address=
Netmask=
Gateway Status= Disabled
Gateway Address=
VLAN= 1
IPv6 Management Interface:
Status= Disabled
IPv6 Address=
IPv6 Prefix=
Gateway Status= Disabled
Gateway Address=
VLAN= 1
L2/MAC ACL:
ID:
1:
Name= System
Description= System
Restriction= Deny only the stations listed below
Stations:
SNMP Agent:
Status= Disabled
Contact= [email protected]
Location= 880 W Maude Ave. Sunnyvale, CA 94085 US
RO Community= public
RW Community= private
SNMP Trap:
Format= Version2
Status= Disabled
SNMPV3 Agent:
Status= Disabled
Ro:
User=
Authentication Type= MD5
Authentication Pass Phrase=
Privacy Type= DES
Privacy Phrase=
Rw:
User=
Authentication Type= MD5
Authentication Pass Phrase=
Privacy Type= DES
Privacy Phrase=
SNMP Trap:
Format= Version3
Status= Disabled
WLAN Service:
ID:
1:
NAME = RuckusIntopZDPSK
Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps
Tx. Rate of Management Frame(5GHz) = 6.0Mbps
Beacon Interval = 100ms
SSID = RuckusIntopZDPSK
Description = RuckusIntopZDPSK
Type = Standard Usage
Authentication = open
Encryption = wpa2
Algorithm = aes
Passphrase = comptest
FT Roaming = Disabled
802.11k Neighbor report = Disabled
Web Authentication = Disabled
Authentication Server = Disabled
Called-Station-Id type = wlan-bssid
Tunnel Mode = Disabled
Background Scanning = Enabled
Max. Clients = 100
Isolation per AP = Disabled
Isolation across AP = Disabled
Zero-IT Activation = Enabled
Priority = High
Load Balancing = Enabled
Band Balancing = Enabled
Dynamic PSK = Disabled
Rate Limiting Uplink = Disabled
Rate Limiting Downlink = Disabled
Auto-Proxy configuration:
Status = Disabled
Inactivity Timeout:
Status = Enabled
Timeout = 5 Minutes
VLAN-ID = 1
Dynamic VLAN = Disabled
Closed System = Disabled
Https Redirection = Disabled
OFDM-Only State = Disabled
Multicast Filter State = Disabled
802.11d State = Enabled
Force DHCP State = Disabled
Force DHCP Timeout = 10
DHCP Option82:
Status = Disabled
Option82 sub-Option1 = Disabled
Option82 sub-Option2 = Disabled
Option82 sub-Option150 = Disabled
Option82 sub-Option151 = Disabled
Ignore unauthorized client statistic = Disabled
STA Info Extraction State = Enabled
BSS Minrate = Disabled
Call Admission Control State = Disabled
PMK Cache Timeout= 720 minutes
PMK Cache for Reconnect= Enabled
NAS-ID Type= wlan-bssid
Roaming Acct-Interim-Update= Disabled
PAP Message Authenticator = Enabled
Send EAP-Failure = Disabled
L2/MAC = No ACLS
L3/L4/IP Address = No ACLS
L3/L4/IPv6 Address = No ACLS
Precedence = Default
Proxy ARP = Enabled
Device Policy = No ACLS
Vlan Pool = No Pools
Role based Access Control Policy = Disabled
SmartRoam = Disabled Roam-factor = 1
White List = No ACLS
Application Visibility = disabled
Apply Policy Group = No_Denys
2:
NAME = RuckusIntopZD1X
Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps
Tx. Rate of Management Frame(5GHz) = 6.0Mbps
Beacon Interval = 100ms
SSID = RuckusIntopZD1X
Description = RuckusIntopZD1X
Type = Standard Usage
Authentication = 802.1x-eap
Encryption = wpa2
Algorithm = aes
Passphrase =
FT Roaming = Disabled
802.11k Neighbor report = Disabled
Web Authentication = Disabled
Authentication Server = Interop
Called-Station-Id type = wlan-bssid
Tunnel Mode = Disabled
Background Scanning = Enabled
Max. Clients = 100
Isolation per AP = Disabled
Isolation across AP = Disabled
Zero-IT Activation = Disabled
Priority = High
Load Balancing = Disabled
Band Balancing = Disabled
Dynamic PSK = Disabled
Rate Limiting Uplink = Disabled
Rate Limiting Downlink = Disabled
Auto-Proxy configuration:
Status = Disabled
Inactivity Timeout:
Status = Enabled
Timeout = 5 Minutes
VLAN-ID = 1
Dynamic VLAN = Disabled
Closed System = Disabled
Https Redirection = Disabled
OFDM-Only State = Disabled
Multicast Filter State = Disabled
802.11d State = Enabled
Force DHCP State = Disabled
Force DHCP Timeout = 10
DHCP Option82:
Status = Disabled
Option82 sub-Option1 = Disabled
Option82 sub-Option2 = Disabled
Option82 sub-Option150 = Disabled
Option82 sub-Option151 = Disabled
Ignore unauthorized client statistic = Disabled
STA Info Extraction State = Enabled
BSS Minrate = Disabled
Call Admission Control State = Disabled
PMK Cache Timeout= 720 minutes
PMK Cache for Reconnect= Enabled
NAS-ID Type= wlan-bssid
Roaming Acct-Interim-Update= Disabled
PAP Message Authenticator = Enabled
Send EAP-Failure = Disabled
L2/MAC = No ACLS
L3/L4/IP Address = No ACLS
L3/L4/IPv6 Address = No ACLS
Precedence = Default
Proxy ARP = Disabled
Device Policy = No ACLS
Vlan Pool = No Pools
Role based Access Control Policy = Disabled
SmartRoam = Disabled Roam-factor = 1
White List = No ACLS
Application Visibility = disabled
Apply Policy Group = No_Denys
3:
NAME = RuckusIntopZDOPEN
Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps
Tx. Rate of Management Frame(5GHz) = 6.0Mbps
Beacon Interval = 100ms
SSID = RuckusIntopZDOPEN
Description = RuckusIntopZDOPEN
Type = Standard Usage
Authentication = 802.1x-eap
Encryption = wpa2
Algorithm = aes
Passphrase =
FT Roaming = Disabled
802.11k Neighbor report = Disabled
Web Authentication = Disabled
Authentication Server = Local Database
Called-Station-Id type = wlan-bssid
Tunnel Mode = Disabled
Background Scanning = Enabled
Max. Clients = 100
Isolation per AP = Disabled
Isolation across AP = Disabled
Zero-IT Activation = Disabled
Priority = High
Load Balancing = Enabled
Band Balancing = Enabled
Dynamic PSK = Disabled
Rate Limiting Uplink = Disabled
Rate Limiting Downlink = Disabled
Auto-Proxy configuration:
Status = Disabled
Inactivity Timeout:
Status = Enabled
Timeout = 5 Minutes
VLAN-ID = 1
Dynamic VLAN = Disabled
Closed System = Disabled
Https Redirection = Disabled
OFDM-Only State = Disabled
Multicast Filter State = Disabled
802.11d State = Enabled
Force DHCP State = Disabled
Force DHCP Timeout = 10
DHCP Option82:
Status = Disabled
Option82 sub-Option1 = Disabled
Option82 sub-Option2 = Disabled
Option82 sub-Option150 = Disabled
Option82 sub-Option151 = Disabled
Ignore unauthorized client statistic = Disabled
STA Info Extraction State = Enabled
BSS Minrate = Disabled
Call Admission Control State = Disabled
PMK Cache Timeout= 720 minutes
PMK Cache for Reconnect= Enabled
NAS-ID Type= wlan-bssid
Roaming Acct-Interim-Update= Disabled
PAP Message Authenticator = Enabled
Send EAP-Failure = Disabled
L2/MAC = No ACLS
L3/L4/IP Address = No ACLS
L3/L4/IPv6 Address = No ACLS
Precedence = Default
Proxy ARP = Enabled
Device Policy = No ACLS
Vlan Pool = No Pools
Role based Access Control Policy = Disabled
SmartRoam = Disabled Roam-factor = 1
White List = No ACLS
Application Visibility = disabled
Apply Policy Group = No_Denys
WLAN Group:
ID:
1:
Name= Default
Description= Default WLANs for Access Points
WLAN Service:
WLAN1:
NAME= RuckusIntopZDPSK
VLAN=
WLAN2:
NAME= RuckusIntopZD1X
VLAN=
WLAN3:
NAME= RuckusIntopZDOPEN
VLAN=
Mosquitto bridge global index file does not exist!
Debug Logs:
All= Disabled
Sys-mgmt= Disabled
Mesh= Disabled
Web-auth= Disabled
Rf-mgmt= Disabled
Radius= Disabled
Hotspot-srv= Disabled
Aps= Disabled
Net-mgmt= Disabled
802.1x= Disabled
Web-svr= Disabled
802.11= Disabled
Dvlan= Disabled
Smart-redundancy= Disabled
Client-association= Disabled
Debug logs of specified MAC address:
Status= Disabled
ruckus#