20
Interoperability Report - Ascom i62 / Motorola 1 2014-11-21 INTEROPERABILITY REPORT Ascom i62 Motorola Solutions, RFS/NX controllers AP622/6522/650/6511/6532/7131/8132 Motorola WING version 5.5.5.0 Ascom i62 and OEM derivatives version 5.2.8 Ascom, Gothenburg November 2014 [ ]

INTEROPERABILITY REPORT Ascom i62 Motorola ... - Site root€¦ · Interoperability Report - Ascom i62 / Motorola 1 ... AP622/6522/650/6511/6532/7131/8132 ... Note that both a root

  • Upload
    dokhue

  • View
    229

  • Download
    0

Embed Size (px)

Citation preview

  • Interoperability Report - Ascom i62 / Motorola 1 2014-11-21

    INTEROPERABILITY REPORT Ascom i62 Motorola Solutions, RFS/NX controllers AP622/6522/650/6511/6532/7131/8132 Motorola WING version 5.5.5.0

    Ascom i62 and OEM derivatives version 5.2.8

    Ascom, Gothenburg

    November 2014

    [ ]

  • Interoperability Report - Ascom i62 / Motorola 2 2014-11-21

    TABLE OF CONTENT: INTRODUCTION ........................................................................................................................... 3

    Ascom solution ......................................................................................................................... 3Motorola solution ...................................................................................................................... 3

    SITE INFORMATION .................................................................................................................... 4SUMMARY .................................................................................................................................... 5

    Known issues ............................................................................................................................ 6Compatibility information .......................................................................................................... 6General conclusion ................................................................................................................... 6

    TEST RESULTS ............................................................................................................................ 7Ascom WLAN Infrastructure Verification VoWiFi ................................................................... 7

    APPENDIX A: TEST CONFIGURATIONS .................................................................................... 8Motorola solutions RFS4000 Controller and AP6xx/65xx/71xx/8132 Access Points. ............... 8

    ESS, Radio and QoS settings ............................................................................................... 8Radio Configuration ............................................................................................................ 10

    Ascom i62 ............................................................................................................................... 16Innovaphone IP6000 (IP PBX) ................................................................................................ 18

    APPENDIX B: DETAILED TEST RECORDS .............................................................................. 19

  • Interoperability Report - Ascom i62 / Motorola 3 2014-11-21

    INTRODUCTION This document describes necessary steps and guidelines to optimally configure the Motorola solutions WLAN platform with Ascom i62 VoWiFi handsets.

    The guide should be used in conjunction with both Motorolas and Ascoms configuration guide(s).

    Ascom solution Ascom Wireless Solutions (www.ascom.com/ws) is a leading provider of on-site wireless communications for key segments such as hospitals, senior care, independent living, manufacturing industries, secure establishments, retail and hotels. More than 75,000 systems are installed at major companies all over the world. The company offers a broad range of voice and professional messaging solutions, creating value for customers by supporting and optimizing their Mission-Critical processes. The solutions are based on VoWiFi, IP-DECT, nurse call and paging technologies, smartly integrated via Ascom Unite into existing enterprise systems. The company has subsidiaries in 12 countries and 1,200 employees worldwide. Founded in 1955 and based in Gteborg, Sweden, Ascom Wireless Solutions is part of the Ascom Group, listed on the Swiss Stock Exchange (ASCN:SIX).

    Motorola solution Motorola Solutions is a leading provider of mission-critical communication products and services for enterprise and government customers. Through leading-edge innovation and communications technology, it is a global leader that enables its customers to be their best in the moments that matter. To learn more, visit www.motorolasolutions.com.

  • Interoperability Report - Ascom i62 / Motorola 4 2014-11-21

    SITE INFORMATION

    Test Site: Ascom US 300 Perimeter park drive Morrisville 27560 NC Participants: Karl-Magnus Olsson, Ascom HQ, Gothenburg TEST TOPOLOGY

  • Interoperability Report - Ascom i62 / Motorola 5 2014-11-21

    SUMMARY Please refer to Appendix B for detailed results for respective access point. WLAN Controller Features

    High Level Functionality Result Association, Open with No Encryption OK Association, WPA-PSK, TKIP OK Association, WPA2-PSK, TKIP / AES Encryption OK Association, PEAP-MSCHAPv2 Auth., AES Encryption OK Association, Multiple ESSIDs OK Beacon Interval and DTIM Period OK Preauthentication Not tested PMKSA Caching OK WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK Active Mode (load test) OK 802.11 Power-save mode OK 802.11 Power-save mode (load test) OK 802.11e U-APSD OK 802.11e U-APSD (load test) OK CAC - TSPEC OK Roaming

    High Level Functionality Result Roaming, Open with No Encryption OK Roaming, WPA-PSK, TKIP Encryption Not tested Roaming, WPA2-PSK, AES Encryption OK * Roaming, PEAP-MSCHAPv2 Auth, AES Encryption OK **

    *) Typical roaming 32-52ms **) Typical roaming 25-46ms

  • Interoperability Report - Ascom i62 / Motorola 6 2014-11-21

    Known issues

    No known issues

    For additional information regarding the known issues please contact [email protected]

    Compatibility information All tests were performed on a RFS4000 running WiNG v 5.5.5.0. However, we guarantee interoperability with all Motorola controllers running WiNG software version 5.5.5.0. Analogously, all tests were performed with AP622, 8132 and for 650, 7131 a less extensive regression test was performed. All access points listed below are supported. i62 version 5.2.8 is using WLAN driver version 3.6.g. Compatible controllers. RFS4000 NX4500, 4524 RFS6000 NX6524 RFS7000 NX9000, 9500, 9510 Compatible access points AP622 AP6522 AP650 AP6511 AP6532 AP7131 AP8132

    General conclusion The result of the verified test areas, such as authentication, association, handover and call stability test, produced in general a good result. The roaming times, both PSK and 802.1x were excellent by ranging in the interval 30 to 50ms both for WPA2 SPK and .1X. Performance has also been proven to be very good. In both active and U-APSD mode it was possible to keep up 18 simultaneously calls on one single access point. Keep in mind that the limitation was available handsets and not system capacity.

  • Interoperability Report - Ascom i62 / Motorola 7 2014-11-21

    TEST RESULTS

    Ascom WLAN Infrastructure Verification VoWiFi Software Versions:

    Motorola WING software 5.5.5.0 AP622/6522650/6511/6532/7131/8132 Ascom i62, v 5.2.8 (WLAN driver version 3.6.g)

    Signaling Protocol: SIP, Innovaphone IP6000 used as SIP server. Version 10 sr8

    Configuration of WLAN System:

    Beacon Interval: 100ms DTIM Period: 5 802.11bg(n) 802.11a(n) WMM/ U-APSD Enabled (See appendix A for QoS profiles) 802.11d Regulatory Domain: World mode

    Ascom i62 Configuration:

    World Mode Regulatory Domain set to World mode. IP DSCP for Voice: 0x2E (46) Expedited Forwarding IP DSCP for Signaling: 0x1A (26) Assured Forwarding 31 Transmit Gratuitous ARP: Enable

    Keep in mind that security options and power save modes were adjusted according to requirements in individual test cases. Please refer to appendix A for information regarding device configuration.

  • Interoperability Report - Ascom i62 / Motorola 8 2014-11-21

    APPENDIX A: TEST CONFIGURATIONS

    Motorola solutions RFS4000 Controller and AP6xx/65xx/71xx/8132 Access Points. In the following chapter you will find screenshots and explanations of basic settings in order to get the i62 operational with a Motorola solution. Please note that security settings were modified according to requirements in individual test cases. ESS, Radio and QoS settings

    Wireless-Wireless LANs-Basic Configuration.

    - Basic SSID settings.

  • Interoperability Report - Ascom i62 / Motorola 9 2014-11-21

    Data rate configuration (2.4Ghz). Wireless-Wireless LANs-Advanced- rates for 2.4Ghz WLANs

    - The default data rate set will work just fine but to improve the performance in the wireless system it is recommended to disable the lowest data rates and disallow .11b client. This can be done by selecting gn rates

    Data rate configuration (5 Ghz). Wireless-Wireless LANs-Advanced- rates for 2.4Ghz WLANs

    - Use the Default data rate set (an rates)

  • Interoperability Report - Ascom i62 / Motorola 10 2014-11-21

    Radio Configuration

    Radio configuration.

    Radio configuration.

    - Ascom recommends a Beacon Interval of 100ms and a DTIM interval of 5. DTIM value 5 is recommended in order to allow maximum battery conservation without impacting the quality. A lower value will negatively impact the standby time.

    - Make sure Dynamic Chain Selection is enabled. This feature will compensate the power level between single stream client and multi stream clients.

    - Select the configured QoS profile

    In the example above Channel is set to Smart under the general AP profile. In the test setup this is overridden by a channel setting on a per Device level. 1. Enabling more than 8 channels will degrade roaming performance. Ascom strongly recommends against going above this limit.

  • Interoperability Report - Ascom i62 / Motorola 11 2014-11-21

    2. Using 40 MHz channels (or channel-bonding) will reduce the number of non-DFS* channels to two in ETSI regions (Europe). In FCC regions (North America), 40MHz is a more viable option because of the availability of additional non-DFS channels. The handset can co-exist with 40MHz stations in the same ESS. 3. Make sure that all non-DFS channel are taken before resorting to DFS channels. The handset can cope in mixed non-DFS and DFS environments; however, due to unpredictability introduced by radar detection protocols, voice quality may become distorted and roaming delayed. Hence Ascom recommends avoiding the use of DFS channels in VoWIFI deployments. *) Dynamic Frequency Selection (radar detection)

    Wireless-WLAN QoS Policy.

    - Make sure WMM is selected as Wireless Client Classification. - If U-APSD is used, make sure to Enable WMM Power Save.

    Note. U-APSD is strongly recommended since it will boost the battery performance dramatically.

  • Interoperability Report - Ascom i62 / Motorola 12 2014-11-21

    Radio QoS Policy, CAC/TSPEC settings (Optional)

    - Enable CAC/TSPEC by checking Enable Voice - Make sure Firewall detection traffic Enable is disabled

    Note. This step is optional and implies that TSPEC Call admission control is set in the i62. If not, uncheck Enable Voice Security settings

    Security profile WPA2-PSK, AES-CCMP encryption. Step 1

  • Interoperability Report - Ascom i62 / Motorola 13 2014-11-21

    Security profile WPA2-PSK, AES-CCMP encryption. Step 2.

    Authentication type EAP step 1. Create a Radius policy under Wireless/AAA Policy.

    - Configure the IP Address to the Radius server - Type in the secret that corresponds to the secret configured in the Radius server.

    Note that both a root and a client certificate are needed for TLS. Otherwise only a root certificate is needed. Server certificate validation can be overridden in version 4.1.12 and above per handset setting.

  • Interoperability Report - Ascom i62 / Motorola 14 2014-11-21

    Authentication type EAP. Step 2.

    - Select Authentication type EAP - Select the already configured AAA Policy.

    Authentication type EAP step 3.

    - Select preferred encryption type. WPA2-CCMP is recommended. - Make sure both PMK caching and Opportunistic Key caching is enabled. Without key caching a

    full EAP exchange will be done every time the handset is roaming and the performance will be degraded.

  • Interoperability Report - Ascom i62 / Motorola 15 2014-11-21

    Configuration: Motorola WING configuration See attached file (Run config.txt) for the RFS4000 configuration.

  • Interoperability Report - Ascom i62 / Motorola 16 2014-11-21

    Ascom i62

    Ascom i62 Network configurations (WPA2-PSK)

  • Interoperability Report - Ascom i62 / Motorola 17 2014-11-21

    i62 network settings for 802.1X authentication (PEAP-MSCHAPv2)

    If 802.1X Authentication is used a root certificate has to be uploaded to the phone by right clicking - > Edit certificates. EAP-TLS will require both a root and a client certificate. Note that both a root and a client certificate are needed for TLS. Otherwise only a root certificate is needed. Server certificate validation can be overridden in version 4.1.12 and above per handset setting (Validate server certificate).

  • Interoperability Report - Ascom i62 / Motorola 18 2014-11-21

    Innovaphone IP6000 (IP PBX) The Innovaphone IP6000 was configured with a static IP address of 192.168.0.50. Signaling is less relevant here since testing homes in on interoperability in relation to the WLAN infrastructure and not features of the IP PBX. IP6000 configuration: See attached file (complete-IP6000-08-03-a6.txt) for configuration.

  • Interoperability Report - Ascom i62 / Motorola 19 2014-11-21

    APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 23 Fail 0 Comments 0 Untested 11 Total 34 Results above is for 622 and 8132. See attached file (WLANinteroperabilityTestReport_X.xls) for detailed test results. MISCELLANEOUS Please refer to the test specification for WLAN systems on Ascoms interoperability web page for explicit information regarding each test case. See URL (requires login): https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability

  • Interoperability Report - Ascom i62 / Motorola 20 2014-11-21

    Document History Rev Date Author DescriptionPA 2012-12-16 SEKMO Initial draft R1 2014-01-07 SEKMO Minor corrections. R1 state R2 2014-11-14 SEKMO Added AP 622 and 8132 v 5.5.5 R2a 2014-11-21 SEKMO Minor corrections after review

    !! Configuration of RFS4000 version 5.5.5.0-018R!!version 2.3!!ip access-list BROADCAST-MULTICAST-CONTROL permit tcp any any rule-precedence 10 permit udp any eq 67 any eq dhcpc rule-precedence 11 deny udp any range 137 138 any range 137 138 rule-precedence 20 deny ip any 224.0.0.0/4 rule-precedence 21 deny ip any host 255.255.255.255 rule-precedence 22 permit ip any any rule-precedence 100 !mac access-list PERMIT-ARP-AND-IPv4 permit any any type ip rule-precedence 10 permit any any type arp rule-precedence 20 !ip snmp-access-list default permit any!firewall-policy default no ip dos tcp-sequence-past-window alg sip!!mint-policy global-default!wlan-qos-policy default qos trust dscp qos trust wmm!radio-qos-policy default no admission-control firewall-detected-traffic no admission-control implicit-tspec admission-control voice max-clients 2 admission-control voice max-airtime-percent 50!aaa-policy radius authentication server 1 host 192.168.0.2 secret 0 secret authentication server 1 proxy-mode through-controller!wlan CompTest802 description CompTest802 ssid CompTest802 vlan 1 bridging-mode tunnel encryption-type ccmp authentication-type none wpa-wpa2 psk 0 comptest use aaa-policy radius!wlan CompTest80211MO description CompTest80211MO ssid CompTest80211MO vlan 1 bridging-mode tunnel encryption-type ccmp authentication-type none wpa-wpa2 psk 0 comptest wpa-wpa2 tkip-countermeasures hold-time 0 data-rates 2.4GHz gn use aaa-policy radius!!management-policy default no http server https server ssh user admin password 1 cec2b32e59e52d3572e0a4ee5899e67131699047e6d03d8c94a35b99aa993edd role superuser access all user operator password 1 d1e2a840b515d32594411c4bb00ee78c4fd485bc773bcdc802fc5e31181a60f9 role monitor access all snmp-server community 0 public ro snmp-server user snmpoperator v3 encrypted des auth md5 0 operator snmp-server user snmptrap v3 encrypted des auth md5 0 motorola snmp-server user snmpmanager v3 encrypted des auth md5 0 motorola!l2tpv3 policy default!profile rfs4000 default-rfs4000 autoinstall configuration autoinstall firmware crypto ikev1 policy ikev1-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ipsec transform-set default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto remote-vpn-client interface radio1 wlan CompTest80211MO bss 1 primary interface radio2 wlan CompTest80211MO bss 1 primary interface up1 ip dhcp trust qos trust dscp qos trust 802.1p interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p interface ge2 ip dhcp trust qos trust dscp qos trust 802.1p interface ge3 ip dhcp trust qos trust dscp qos trust 802.1p interface ge4 ip dhcp trust qos trust dscp qos trust 802.1p interface ge5 ip dhcp trust qos trust dscp qos trust 802.1p interface wwan1 interface pppoe1 use firewall-policy default logging on service pm sys-restart router ospf!profile ap81xx default-ap81xx no autoinstall configuration no autoinstall firmware crypto ikev1 policy ikev1-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ipsec transform-set default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto remote-vpn-client interface radio1 beacon dtim-period 5 wlan CompTest80211MO bss 1 primary interface radio2 beacon dtim-period 5 wlan CompTest80211MO bss 1 primary interface radio3 interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p interface ge2 ip dhcp trust qos trust dscp qos trust 802.1p interface wwan1 interface pppoe1 use firewall-policy default service pm sys-restart router ospf!profile ap71xx default-ap71xx autoinstall configuration autoinstall firmware crypto ikev1 policy ikev1-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ipsec transform-set default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto remote-vpn-client interface radio1 channel 1 beacon dtim-period 5 wlan CompTest80211MO bss 1 primary interface radio2 beacon dtim-period 5 wlan CompTest80211MO bss 1 primary interface radio3 interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p interface ge2 ip dhcp trust qos trust dscp qos trust 802.1p interface vlan1 ip address dhcp ip dhcp client request options all interface wwan1 interface pppoe1 use firewall-policy default logging on service pm sys-restart router ospf!profile ap6532 default-ap6532 autoinstall configuration autoinstall firmware crypto ikev1 policy ikev1-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ipsec transform-set default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto load-management crypto remote-vpn-client interface radio1 wlan CompTest80211MO bss 1 primary interface radio2 wlan CompTest80211MO bss 1 primary interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p interface vlan1 ip address dhcp ip dhcp client request options all interface pppoe1 use firewall-policy default logging on service pm sys-restart router ospf!profile ap650 default-ap650 autoinstall configuration autoinstall firmware crypto ikev1 policy ikev1-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ipsec transform-set default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto load-management crypto remote-vpn-client interface radio1 beacon dtim-period 5 wlan CompTest80211MO bss 1 primary wlan CompTest802 bss 2 primary interface radio2 beacon dtim-period 5 wlan CompTest80211MO bss 1 primary wlan CompTest802 bss 2 primary interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p interface vlan1 ip address dhcp ip dhcp client request options all interface pppoe1 use firewall-policy default logging on service pm sys-restart!profile ap6511 default-ap6511 autoinstall configuration autoinstall firmware interface radio1 wlan CompTest80211MO bss 1 primary interface up1 ip dhcp trust qos trust dscp qos trust 802.1p interface fe1 ip dhcp trust qos trust dscp qos trust 802.1p interface fe2 ip dhcp trust qos trust dscp qos trust 802.1p interface fe3 ip dhcp trust qos trust dscp qos trust 802.1p interface fe4 ip dhcp trust qos trust dscp qos trust 802.1p interface vlan1 ip address dhcp ip address zeroconf secondary ip dhcp client request options all interface pppoe1 use firewall-policy default logging on service pm sys-restart!profile ap622 default-ap622 no autoinstall configuration no autoinstall firmware crypto ikev1 policy ikev1-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal default encryption aes-256 group 2 hash sha crypto ipsec transform-set default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto load-management crypto remote-vpn-client interface radio1 data-rates gn beacon dtim-period 5 wlan CompTest802 bss 1 primary wlan CompTest80211MO bss 2 primary interface radio2 shutdown beacon dtim-period 5 wlan CompTest80211MO bss 1 primary interface ge1 ip dhcp trust qos trust dscp qos trust 802.1p use firewall-policy default service pm sys-restart router ospf!rf-domain default timezone Etc/GMT-5 country-code us!rfs4000 5C-0E-8B-1A-F8-06 use profile default-rfs4000 use rf-domain default hostname rfs4000-1AF806 license AP DEFAULT-6AP-LICENSE license ADSEC DEFAULT-ADV-SEC-LICENSE ip default-gateway 192.168.0.50 ip route 172.20.106.0/24 192.168.0.50 interface radio1 shutdown interface radio2 shutdown interface vlan1 description "Virtual Interface for LAN" ip address 192.168.0.17/24 ip address zeroconf secondary logging on logging console warnings logging buffered warnings!ap81xx B4-C7-99-A0-96-C0 use profile default-ap81xx use rf-domain default hostname ap8132-A096C0 autoinstall firmware device-upgrade auto interface radio1 channel 6 power 6 interface radio2 no shutdown channel 36 power 6!ap71xx 00-23-68-96-FF-AC use profile default-ap71xx use rf-domain default hostname ap71xx-96FFAC interface radio1 no shutdown channel 1 power 6 interface radio2 channel 40 power 6!ap71xx 00-23-68-97-02-94 use profile default-ap71xx use rf-domain default hostname ap71xx-970294 no autoinstall configuration no autoinstall firmware autoinstall start-interval 1 interface radio1 channel 6 power 15 interface radio2 channel 40 power 15 no configuration-persistence!ap650 5C-0E-8B-33-D9-70 use profile default-ap650 use rf-domain default hostname ap650-33D970 interface radio1 channel 6 power 8 interface radio2 channel 36 power 8!ap650 5C-0E-8B-33-E1-AC use profile default-ap650 use rf-domain default hostname ap650-33E1AC interface radio1 channel 1 power smart interface radio2 channel 40 power 8!ap622 B4-C7-99-46-56-C8 use profile default-ap622 use rf-domain default hostname ap622-4656C8 device-upgrade auto interface radio1 no shutdown channel 1 power 8 interface radio2 no shutdown channel 36w power 8 wlan CompTest80211MO bss 1 primary!ap622 B4-C7-99-49-0F-24 use profile default-ap622 use rf-domain default hostname ap622-490F24 interface radio1 no shutdown channel 6 power 8 interface radio2 no shutdown channel 40w power 8!!end

    WLAN TR

    WLAN Interoperability Test ReportWLAN configuration:

    Beacon Interval: 100ms

    Test object - Handset:DTIM Interval: 5

    Ascomi62 sw version 5.2.8802.11d Regulatory Domain: WORLD

    Test object - WLAN system:WMM Enabled (Auto/WMM)

    Motorola RFS4000 v 5.5.5.0No Auto-tune

    AP8231 and AP622AP622AP8132Single Voice VLAN

    2.4Ghz5.0Ghz2.4Ghz5.0Ghz

    Test CaseDescriptionVerdictVerdictVerdictVerdictComment

    TEST AREA ASSOCIATION / AUTHENTICATION

    #101Association with open authentication, no encryptionPASSPASSPASSPASS

    #104Association with WPA-PSK authentication, TKIP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #105Association with WPA-PSK authentication, AES-CCMP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #106Association with WPA2-PSK authentication, TKIP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASS

    #110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSPASSPASSPASSRoot certificate neded to be loaded to handset. FreeRADIUSFAIL

    #111Association with EAP-FAST authenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #115Association with multiple ESSIDs on APPASSPASSPASSPASSSee Comment

    #116Association with EAP-TLS authenticationPASSPASSPASSPASSRoot and Client certificate needed to be loaded to handset. FreeRADIUS

    TEST AREA POWER-SAVE AND QOSPASS

    #150802.11 Power-save modePASSPASSPASSPASSWLAN info sometimes show QoS: noneFAIL

    #151Beacon period and DTIM intervalPASSPASSPASSPASSDTIM 1,2,3,5 beacon period 100tuNOT TESTED

    #152802.11e U-APSDPASSPASSPASSPASSSee Comment

    #202WMM prioritizationPASSPASSPASSPASSbackground load generated with iPerf. No noticable degradation of voice quiality

    TEST AREA "PERFORMANCE"

    #301Active mode - unencryptedPASSPASSPASSPASS16 handset in call on 1 single AP

    #303Active mode encrypted with WPA2-PSKPASSPASSPASSPASS16 handset in call on 1 single AP

    #308Power-save mode U-APSD WPA2-PSKPASSPASSPASSPASS16 handset in call on 1 single AP

    #309Power-save mode U-APSD WPA2-PSK / AES, background loadNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #310CAC - TSPECNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA ROAMING AND HANDOVER TIMES

    #401Handover with open authentication and no encryptionPASSPASSPASSPASSAP622: an: 19ms bgn: 22 8132: bgn: 22ms an: 24ms

    #403Handover with WPA-PSK authentication and TKIP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #404Handover with WPA2-PSK auth and AES-CCMP encryptionPASSPASSPASSPASSAP622: an: 32ms bgn: 42 8132: bgn: 52ms an: 46ms

    #408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSPASSPASSPASSAP622: an: 26ms bgn: 27 8132: bgn: 46ms an: 25ms

    #410Handover using PMKSA cachingPASSPASSPASSPASS

    #411Handover using PMKSA and opportunistic/proactive key cachingPASSPASSPASSPASSSame test as #408

    #412PreauthenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA BATTERY LIFETIME

    #501Battery lifetime in idlePASSPASSPASSPASS80-100h

    #502Battery lifetime in call with no power savePASSPASSPASSPASS~3h

    #504Battery lifetime in call with power save mode U-APSDPASSPASSPASSPASS12-14h

    TEST AREA STABILITY

    #601Duration of call Active modePASSPASSPASSPASS24h + call stability

    #602Duration of call U-APSD modePASSPASSPASSPASS24h + call stability

    TEST AREA 802.11n

    #801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #802Frame aggregation A-MPDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #80440Mhz channelsNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #805802.11n ratesPASSPASSPASSPASS

    WLAN TR

    WLAN Interoperability Test ReportWLAN configuration:

    Beacon Interval: 100ms

    Test object - Handset:DTIM Interval: 5

    Ascomi62 sw version 5.2.8802.11d Regulatory Domain: WORLD

    Test object - WLAN system:WMM Enabled (Auto/WMM)

    Motorola RFS4000, AP 7131 and 655No Auto-tune

    Version 5.5.5.0AP7131AP650Single Voice VLAN

    2.4Ghz5.0Ghz2.4Ghz5.0Ghz

    Test CaseDescriptionVerdictVerdictVerdictVerdictComment

    TEST AREA ASSOCIATION / AUTHENTICATION

    #101Association with open authentication, no encryptionPASSPASSPASSPASS

    #104Association with WPA-PSK authentication, TKIP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #105Association with WPA-PSK authentication, AES-CCMP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #106Association with WPA2-PSK authentication, TKIP encryptionPASSPASSPASSPASS

    #107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASS

    #110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSPASSPASSPASSFreeRADIUS. Root CA loaded in handset. FreeRADIUSFAIL

    #111Association with EAP-FAST authenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #115Association with multiple ESSIDs on APNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDSee Comment

    #116Association with EAP-TLS authenticationPASSPASSPASSPASSFreeRADIUS. Root CA and client cert needed. FreeRADIUS

    TEST AREA POWER-SAVE AND QOSPASS

    #150802.11 Power-save modePASSPASSPASSPASSFAIL

    #151Beacon period and DTIM intervalNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #152802.11e U-APSDPASSPASSPASSPASSSee Comment

    #202WMM prioritizationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA "PERFORMANCE"

    #301Active mode - unencryptedNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #303Active mode encrypted with WPA2-PSKNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #308Power-save mode U-APSD WPA2-PSKNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #309Power-save mode U-APSD WPA2-PSK / AES, background loadNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #310CAC - TSPECNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA ROAMING AND HANDOVER TIMES

    #401Handover with open authentication and no encryptionPASSPASSPASSPASS7132: bgn: 27ms an:25ms 650: bgn:22 an: 25ms

    #403Handover with WPA-PSK authentication and TKIP encryptionNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #404Handover with WPA2-PSK auth and AES-CCMP encryptionPASSPASSPASSPASS7132: bgn: 49ms an:45ms 650: bgn:42 an: 45ms

    #408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSPASSPASSPASS7132: bgn: 51ms an:28ms 650: bgn:25 an: 44ms

    #409Handover with EAP-FAST authentication with CCKMNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #410Handover using PMKSA cachingPASSPASSPASSPASSdefault enabled. Same test case as #408

    #411Handover using PMKSA and opportunistic/proactive key cachingPASSPASSPASSPASSdefault enabled. Same test case as #408

    #412PreauthenticationNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA BATTERY LIFETIME

    #501Battery lifetime in idleNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #502Battery lifetime in call with no power saveNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #504Battery lifetime in call with power save mode U-APSDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA STABILITY

    #601Duration of call Active modePASSPASSPASSPASS24h+ call maintained

    #602Duration of call U-APSD modePASSPASSPASSPASS24h+ call maintained

    TEST AREA 802.11n

    #801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #802Frame aggregation A-MPDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #80440Mhz channelsNOT TESTEDPASSNOT TESTEDPASS

    #805802.11n ratesPASSPASSPASSPASS