AP-51XX v2 by DamianGibson

VIEWS: 0 PAGES: 7

									AP-51XX v2.0.0.0-045R – Release Notes




               AP-51XX v2.0.0.0-045R – Release Notes
Contents
Introduction
New Features
AP-5131 Dependant Mode SKU
AP-51XX Hardware/ Software Compatibility Matrix
AP-51XX Default Configurations
Firmware Update
Resetting the AP-51XX Password
AP-51XX MAC Addresses
Known Issues and Recommendations

Introduction – AP-5131 Indoor AP & AP-5181 Outdoor AP

Designed to address the wireless and wired connectivity needs of the small office or
retail outlet, the AP-5131 provides a single-box solution which integrates all services
required to extend secure broadband access to mobile users. With the ability to
connect local users to a remote private network via a secured IPSec link, the AP-
5131 is ideal for deployment in branch offices or at telecommuter sites for
enterprise-class WLAN performance and secure connectivity of wired clients. The AP-
5131 integrates a Router and DHCP Server for local LAN connectivity; a configurable
stateful inspection firewall for LAN isolation; a VPN endpoint for secure backhaul
connectivity; a QoS Engine for superior performance of real time video and voice
applications; and a AAA server with Hotspot Gateway for security and public access
management. With v1.1 or newer, the AP-5131 offers a self-assembling, self-healing
Mesh Networking architecture designed to extend the reach of the wireless network
via wireless communication between Access Points.

The AP-5181, a hardware variant of the AP-5131 designed specifically for outdoor
use or in harsh environments requiring an extended operational temperature range,
supports the same software feature set as the AP-5131 and operates with the same
firmware, version 1.1.1.0-020R or more recent. The AP-5181 hardware does not
support any AP-51XX firmware version prior to version 1.1.1.0-020R.

Version 2.0.0.0-045R introduces an Adaptive mode of operation for the AP-51XX.
AP5131’s and AP-5181’s at remote branch offices or telecommuter sites can now be
controlled from a wireless switch at a central site over a WAN connection. The
Adaptive Access Points remain operational even if connectivity to the wireless switch
is lost. The following section further describes this capability.

New Features in version 2.0.0.0-045R

1. Adaptive AP Support: An Access Point running firmware version 2.0.0.0-045R can
   be adopted into the wireless switch (WS5100 firmware ver 3.1 & RFS7000
   firmware version 1.1) and receive its wireless configurations (WLAN
   configuration, MESH Configuration & Radio Configuration) from the switch. This
   allows for centralized configuration of distributed Access Points from a wireless
   switch at a central site. For a list of Adaptive AP “Known Issues” please refer
   to the RFS7000 Fw 1.1 / WS5100 Fw ver 3.1 Release Notes.

2. Mobile Unit Locationing Support: This feature if enabled will create a probe table
   for up to 200 Mobile Units containing information that can be SNMP polled by an


                                         Page 1                                  1/14/2008
AP-51XX v2.0.0.0-045R – Release Notes



    external management system like RF Manager for locationing purposes. Mobile
    Unit locationing support can be Enabled or Disabled from the Access Point CLI.

3. Radius Time Based Authentication: This feature extends the capability of the
   onboard RADIUS server on the AP-51XX to allow “time-based-authentication”
   for user groups when accessing a WLAN. This feature will only be supported if
   NTP is in use.

4. Rogue AP Detection Enhancement: For dual radio access points the AP-51XX now
   supports the Detector Radio to perform dual band scanning across the A/B/G
   channels. Select the “RF ABG Scan” option under Rogue AP Detection on the
   Access Point’s GUI.



AP-5131 Dependent Mode SKU

2 low priced SKU configurations of the AP-5131 are being introduced allowing
customers to take advantage of the Adaptive AP architecture to reduce deployment
costs.

These Dependent Mode AP configurations are a variant of the AP-5131 and will be
functional only after the Access Point is initially adopted by a Wireless Switch. After
adoption the dependent mode AP receives its configuration from the wireless switch
and starts functioning like other Adaptive Access Points. For ongoing operation, the
Dependent Mode AP-5131 needs to maintain connectivity with the wireless switch. In
the event switch connectivity is lost the Dependent Mode AP-5131 will continue
operating as a stand-alone Access Point for a period of 3 days before resetting and
executing the switch discovery algorithm again.

Dependent Mode AP-5131’s can be identified based on a special character (D -
Dependent) in the part number label printed at the bottom of the Access Point.
Following part numbers identify the Dependent Mode AP-5131:

AP-5131-40020-D-WR: Dependent AP-5131 Single Radio (Switch Required)
AP-5131-13040-D-WR: Dependent AP-5131 Dual Radio (Switch Required)


AP-51XX Hardware/ Software Compatibility Matrix

                                        v1.0.0.0      v1.1.1.0    v1.1.2.0    v2.0.0.0-045R
                                        v1.0.1.0
                                        v1.1.0.0

AP-5131                                 Supported     Supported   Supported   Supported
AP-5181                                 Not-          Supported   Supported   Supported
                                        Supported
AP-5131 & AP-5181 with                  Not-          Not-        Supported   Supported
new processor revision                  Supported     Supported
(July 2007)
AP-5131 Dependent Mode                  Not-          Not-        Not-        Supported
AP-5131-40020-D-WR                      Supported     Supported   Supported
AP-5131-13040-D-WR


                                                    Page 2                                1/14/2008
AP-51XX v2.0.0.0-045R – Release Notes




AP-51XX Default Configurations

                        v1.0.0.0                   v1.1.0.0                 v1.1.1.0
                        v1.0.1.0                                            v1.1.2.0
                                                                            v2.0.0.0-045R
WAN                     DHCP client                Static IP: 10.1.1.1      Static IP: 10.1.1.1
                        Auto-update enabled        Static Mask:             Static Mask:
                                                   255.0.0.0                255.0.0.0

LAN1 (a.k.a             Static IP: 192.168.0.1     DHCP Client              DHCP Client
LAN)                    Static Mask:               Auto-update enabled      Auto-update enabled
                        255.255.255.0              Default Gateway*         Default Gateway*
                        DHCP Server enabled        Ethernet Port Enabled    Ethernet Port Enabled

LAN2                    n/a                        Static IP: 192.168.1.1   Disabled
                                                   Static Mask:
                                                   255.255.255.0
                                                   DHCP Server Enabled

Access via              HTTPS, SSH, SNMP:          HTTP, HTTPS, Telnet,     HTTP, HTTPS, Telnet,
WAN Port                enabled                    SSH, SNMP: enabled       SSH, SNMP: enabled


*DNS and Domain Name parameters take effect on the Default Gateway Interface.


Firmware Update

Note: Upgrading from 1.0 to 2.0 is a two step process which requires the same
upgrade procedure to be repeated twice. The first upgrade will result in a bootloader
change and the second upgrade will result in a firmware change. For subsequent
upgrades a single download will suffice. Using Auto Update, the AP will automatically
update itself twice when upgrading to v2.0

Note: Upgrading from 1.0/1.1/1.1.1/1.1.2 to 2.0 retains the existing settings. It is
recommended, however, that users export their 1.0/1.1/1.1.1/1.1.2 configuration for
backup purposes prior to upgrading.

Note: When downgrading from v1.1.2 to v1.0, all configuration settings are lost and
the AP will return to factory defaults.

Note: Dependent Mode AP-5131’s (with a D in the Part Number) cannot be
downgraded to any software version below 2.0.0.0-045R.

To conduct a firmware update on the AP-51XX from 1.X to 2.0:

    1. Select ‘System Configuration’       ‘Firmware Update’ from the AP-51XX menu
       tree of the GUI.
    2. Specify the name of the target firmware file within the ‘Filename’ field.
    3. If the target firmware file resides within a directory, specify a complete path
       for the file within the ‘Filepath (optional)’ field.


                                                 Page 3                                 1/14/2008
AP-51XX v2.0.0.0-045R – Release Notes



    4. Enter an IP address for the FTP or TFTP server used for the update.
    5. Use the drop-down menu to specify the FTP or TFTP server's location. Select
       the appropriate button, FTP or TFTP, for the server’s location. The server can
       reside on the WAN or on the LAN.
    6. Select either the FTP or TFTP button to define whether the firmware file
       resides on a FTP or TFTP server.
    7. Set the following FTP parameters if applicable:
           • Username - Specify a username for the FTP server login.
           • Password - Specify a password for FTP server login.




    8. Click ‘Apply’.
    9. Click the ‘Perform Update’ button to initiate the update. Upon confirming the
        firmware update, the AP reboots and completes the update. This step may
        take several minutes.
    10. After the AP reboots, return to the ‘Firmware Update’ screen.
    11. Repeat Step #9.
    12. After the AP reboots, clear the browser cache and return to the ‘Firmware
        Update’ screen. Check the Status field to verify whether the firmware update
        was successful.




                                         Page 4                                1/14/2008
AP-51XX v2.0.0.0-045R – Release Notes




Resetting the AP-51XX Password

The AP-51XX Command Line Interface (CLI) enables users who forget their password
to reset it to the factory default (‘motorola’). To reset the AP-51XX password:
Connect one end of the null modem serial cable to the AP-51XX’s console connector.
(Use cable p/n 25-96992-01R for AP-5131 and p/n 25-97593-01R for the AP-5181).
Attach the other end of the null modem serial cable to the serial port of a PC running
HyperTerminal or a similar emulation program.
    1. Set the HyperTerminal program to use 19200 baud, 8 data bits, 1 stop bit, no
       parity, no flow control and auto-detect for terminal emulation.
    2. Press <ESC> or <Enter> to access the AP-51XX CLI. A serial connection has
       now been established and the user should be able to view the serial
       connection window.
    3. Reset the AP-51XX. An AP-51XX can be reset by removing and re-inserting
       the LAN cable or removing and re-inserting the power cable. As the AP-51XX
       is re-booting, a “Press esc key to run boot firmware” message displays.
    4. Quickly press <ESC>. If the <ESC> key is pressed within three seconds a
       boot> prompt displays.
    5. Type the following at the boot prompt: passwd default
    6. Reset the AP-51XX by typing the following at the boot prompt: reset
       system. When the AP-51XX re-boots again, the password will return to its
       default value of “motorola”. You can now access the AP-51XX.

Note: On versions prior to v1.1.2.0, the default password is ‘symbol’.

AP-51XX MAC Addresses

The AP-51XX has one MAC address for each LAN, which are displayed in ‘LAN Stats’
and ‘WAN Stats’, under the ‘Status and Statistics’ page in the Web User Interface.

Each radio on an AP-51XX supports four Basic Service Sets (BSS). Each BSS, has a
corresponding MAC address. The MAC address, which is displayed in the Web
Interface, under the Radio Settings screen, corresponds to that of BSS #1. The MAC
addresses for the other three BSS’s (BSS #2, #3, #4) are derived by adding 1, 2, 3,
respectively, to the radio MAC address (same as BSS #1).

For example: If the radio MAC address displayed under the Radio Settings screen
(Network Configuration    Wireless  Radio Configuration    Radio<n>) is
00:A0:F8:72:20:DC, then the BSSs for that radio will have the following MAC
addresses:




                                        Page 5                                 1/14/2008
AP-51XX v2.0.0.0-045R – Release Notes




BSSID                                   MAC Address         Hexadecimal Addition
BSSID#1                                 00:A0:F8:72:20:DC   Same as Radio MAC
                                                            Address
BSSID#2                                 00:A0:F8:72:20:DD   Radio MAC Address + 1
BSSID#3                                 00:A0:F8:72:20:DE   Radio MAC Address + 2
BSSID#4                                 00:A0:F8:72:20:DF   Radio MAC Address + 3


Known Issues & Recommendations


Recommendation: AP-5131 access points participating in a mesh topology should use
the same firmware version. Since AP-5181 support starts from version 1.1.1
onwards, it is recommended to upgrade AP-5131s to the same version before using
them in a mixed mesh topology.


    1. Wireless client disassociation after configuration change. (CRID: 10751):
       After applying certain changes to the configuration, wireless clients may
       temporarily become disconnected as each radio resets.

    2. Mesh Network Connectivity while making changes to a Base or Client Bridge
       node: Mesh connectivity may temporarily be unavailable when making
       configuration changes to Base or Client Bridge APs.

    3. If using the Radius time-based authentication feature to authenticate access
       point user permissions, ensure UTC has been selected from the Date and
       Time Settings screen’s Time Zone field. If UTC is not selected, time based
       authentication will not work properly.

    4. Onboard Radius (CRID: 44824)-- Shared secret mismatch when upgrading
       from 1.1.0.0-045R to 2.0.0.0-44R. Workaround: After upgrading manually
       change the Radius Shared Secret to motorola.

    5. VPN (CRID: 41807): If the AP WAN IP address is set to DHCP client and if the
       WAN interface renews its IP address, the new IP address does not get
       associated with the pre-configured VPN tunnel. A change in the WAN IP
       address will cause the VPN tunnel to go down. Workaround: Manually change
       the IP address in the tunnel configuration.

    6. Importing Admin User Password: Importing the Admin User password will
       only take effect if the AP is set to factory defaults (i.e. password is
       “motorola”).

    7. Rogue AP Detection Command (CRID: 29889): The “Add all to allowed list”
       command in the Rogue AP Detection screen may result in the Active Allowed
       AP List not being updated correctly.

    8. VPN Configuration Import (CRID: 29576): The AP-51XX will not import a VPN
       configuration if the tunnel name parameter contains a space in the text.




                                                 Page 6                        1/14/2008
AP-51XX v2.0.0.0-045R – Release Notes



    9. AP-4131 vs. AP-51XX Default Basic Rates Setting: The default Basic Rates
       setting for the AP-51XX is 1, 2, 5.5 and 11 Mbps. The AP- 4131’s default
       Basic Rates setting was 1 & 2 Mbps only. Note that this difference may cause
       interoperability problems with certain older wireless devices. The default
       setting can be changed in the AP-51XX

    10. Java GUI does not load in web browser: If the Java Web User Interface does
        not load in the browser it may be that a previous version of the html page is
        being stored in the browser’s cache. To solve this problem, clear the browser
        cache and set the browser to always download web pages.




                                         Page 7                                1/14/2008

								
To top