20
Interoperability Report - Ascom i62 – Ruckus Wireless 1 2016-09-15 INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, T300, R310, R500, R600, R710 and ZF7372, ZF7982 access points i62 and OEM derivatives version 5.5.0 Ruckus wireless version 9.13.0.0.232 Ascom, Gothenburg August 2016 [ ]

INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, …...Interoperability Report - Ascom i62 – Ruckus Wireless 17 2016-09-15 Network settings for .1X authentication (PEAP-MSCHAPv2)

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

  • Interoperability Report - Ascom i62 – Ruckus Wireless 1 2016-09-15

    INTEROPERABILITY REPORT Ascom i62 Ruckus Wireless, T300, R310, R500, R600, R710 and ZF7372, ZF7982 access points i62 and OEM derivatives version 5.5.0

    Ruckus wireless version 9.13.0.0.232

    Ascom, Gothenburg

    August 2016

    [ ]

  • Interoperability Report - Ascom i62 – Ruckus Wireless 2 2016-09-15

    TABLE OF CONTENT: INTRODUCTION ........................................................................................................................... 3 

    About Ascom ............................................................................................................................ 3 About Ruckus Wireless ............................................................................................................. 3 

    SITE INFORMATION .................................................................................................................... 4 SUMMARY .................................................................................................................................... 5 

    Known issues ............................................................................................................................ 6 Compatibility information .......................................................................................................... 6 General conclusion ................................................................................................................... 6 

    APPENDIX A: TEST CONFIGURATIONS .................................................................................... 7 Ruckus Wireless ZD 3000 version 9.13.0.0.232 ....................................................................... 7 

    Security settings (PSK) ......................................................................................................... 8 Security settings (802.1X / PEAP-MSCHAPv2) .................................................................. 10 General settings (QoS, Radio) ............................................................................................ 13 CLI commands .................................................................................................................... 15 

    Innovaphone IP6000 (IP PBX) ................................................................................................ 18 APPENDIX B: DETAILED TEST RECORDS .............................................................................. 19 

  • Interoperability Report - Ascom i62 – Ruckus Wireless 3 2016-09-15

    INTRODUCTION This document describes necessary steps and guidelines to optimally configure Ruckus wireless platform with Ascom i62 VoWiFi handsets.

    The guide should be used in conjunction with both Ruckus and Ascoms configuration guide(s).

    About Ascom Ascom Wireless Solutions (www.ascom.com/ws) is a leading provider of innovative communication solutions providing integrated workflow intelligence for hospitals, senior care, and independent living, and other business areas where mission-critical communication is essential. Approximately 100 000 systems are installed globally. The company offers a broad range of voice and professional messaging solutions, creating value for customers by supporting and optimizing their mission-critical communication processes. The solutions are based on Cellular, VoWiFi, IP-DECT, Nurse call and Paging technologies, smartly integrated via Ascom Unite into existing enterprise systems. The company has subsidiaries in 13 countries and 1,200 employees worldwide. Founded in 1955 and based in Göteborg, Sweden, Ascom Wireless Solutions is part of the Ascom Group, listed on the Swiss Stock Exchange (ASCN:SIX).

    About Ruckus Wireless The Ruckus ZoneFlex system is a centrally managed WLAN system comprising of controllers and a variety of 802.11 a/b/g/n APs. There are two unique features in the ZoneFlex product that enhance voice communications. One is BeamFlex, our smart beamforming antennas, and the second is SmartCast, our traffic management engine. Combining a compact internal antenna array with expert control software, BeamFlex continuously ranks the antenna configurations for each receiving device and reconfigures itself in real-time to bypass interference and physical barriers. SmartCast provides automatic flow classification, software pre-queuing per station and per packet scheduling of traffic over the smart antenna array. It applies heuristics to automatically classify voice packets and place them in the right queue.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 4 2016-09-15

    SITE INFORMATION

    Test Site: Ascom US 300 Perimeter park drive Morrisville, NC, US-27560 USA Participants: Karl-Magnus Olsson, Ascom HQ, Gothenburg Sweden TEST TOPOLOGY

  • Interoperability Report - Ascom i62 – Ruckus Wireless 5 2016-09-15

    SUMMARY Please refer to Appendix B for detailed results. WLAN Controller Features

    High Level Functionality Result Association, Open with No Encryption OK Association, WPA2-PSK, AES Encryption OK Association, PEAP-MSCHAPv2 Auth., AES Encryption OK Association, Multiple ESSIDs OK Beacon Interval and DTIM Period OK Preauthentication N/A PMKSA Caching OK WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK Active Mode (load test) OK 802.11 Power-save mode OK 802.11e U-APSD OK 802.11e U-APSD (load test) OK Roaming

    High Level Functionality Result Roaming, Open with No Encryption OK (Typical roaming time 23ms)* Roaming, WPA2-PSK, AES Encryption OK (Typical roaming time 50ms)* Roaming, PEAP-MSCHAPv2 Auth, AES Encryption OK (Typical roaming time 49ms)* /** *) Average roaming times are measured using 802.11an. Refer to Appendix B for detailed test results * *) Measured times is with opportunistic/proactive Key Caching enabled (default enabled)

  • Interoperability Report - Ascom i62 – Ruckus Wireless 6 2016-09-15

    Known issues

    - Note that the “qtime” settings described in the “CLI settings” section is necessary for optimal battery life.

    For additional information regarding the known issues please contact [email protected] or [email protected]

    Compatibility information A full test round was performed on ZF7982, 7372, R310, R500 an R700. Access points T300 and R600 were not specifically tested but are fully supported given chipset similarities etc. All test were done with a ZD3000 controller. We ensure compatibility/interoperability with all the access points and controllers listed below given that they run the software tested. i62 version 5.5.0 is using WLAN driver version 3.6.h Supported access ports with Ruckus Wireless version 9.13.1.0.232: ZoneFlex 7372, 7982 T300, R310, R500, R600, 710 Supported controller platforms with Ruckus Wireless version 9.13.1.0.232: ZoneDirector 1100/1200 ZoneDirector 3000 ZoneDirector 5000

    General conclusion All test cases including association, roaming and call stability all produced good results. Roaming times with were in the range of 40-50ms for both WPA2 PSK and .1X authentication (with OKC). The outcome of the load test was in general acceptable. In both active and U-APSD mode it was possible to keep up 12 simultaneously calls per AP radio.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 7 2016-09-15

    APPENDIX A: TEST CONFIGURATIONS

    Ruckus Wireless ZD 3000 version 9.13.0.0.232 In the following chapter you will find screenshots and explanations of basic settings in order to get a Ruckus WLAN system to operate with an Ascom i62. Please note that security settings were modified according to requirements in individual test cases.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 8 2016-09-15

    Security settings (PSK)

    - Example of how to configure the system for PSK (WPA2-AES)

  • Interoperability Report - Ascom i62 – Ruckus Wireless 9 2016-09-15

    Make sure Proxy ARP is enabled.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 10 2016-09-15

    Security settings (802.1X / PEAP-MSCHAPv2) Example of how to configure the system for .1X authentication

    AAA server dashboard. In the example one Radius servers configured (Interop). See next picture for configuration of the profile “Interop”.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 11 2016-09-15

    The IP address and the secret must correspond to the IP and the credential used by the Radius server.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 12 2016-09-15

    Configuration of ESS profile for utilization of 802.1X authentication. Authentication server “Interop” corresponds to the server configured in previous step. Note. Depending on which Authentication method used it might be necessary to add a certificate into the i62. PEAP-MSCHAPv2 requires a CA certificate and EAP-TLS requires both a CA certificate and a client certificate. Server certificate validation can be overridden in version 4.1.12 and above per handset setting. Note. Refer to the i62 section in Appendix A for matching handset configurations.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 13 2016-09-15

    General settings (QoS, Radio)

    Access points dashboard showing configured access points.

    Access points dashboard showing configured access points (continued)

  • Interoperability Report - Ascom i62 – Ruckus Wireless 14 2016-09-15

    Ascom recommended settings for 802.11b/g/n are to only use only channel 1, 6 and 11. Note that in this example the TX power and channel has been modified for test purpose. General guidelines when deploying Ascom i62 handsets in 802.11a/n/ac environments:

    1. Enabling more than 8 channels will degrade roaming performance. Ascom recommends against going above this limit.

    2. Using 40 MHz channels (or “channel-bonding”) will reduce the number of non-DFS* channels to two in ETSI regions (Europe). In FCC regions (North America), 40MHz is a more viable option because of the availability of additional non-DFS channels. The handset can co-exist with 40MHz stations in the same ESS.

    3. Ascom do support and can coexist in 80MHz channel bonding environments. The recommendations is however to avoid 80MHz channel bonding as it severely reduces the number of available non overlapping channels.

    4. Make sure that all non-DFS channel are taken before resorting to DFS channels. The handset can cope in mixed non-DFS and DFS environments; however, due to “unpredictability” introduced by radar detection protocols, voice quality may become distorted and roaming delayed. Hence Ascom recommends if possible avoiding the use of DFS channels in VoWIFI deployments.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 15 2016-09-15

    *) Dynamic Frequency Selection (radar detection)

    CLI commands DTIM DTIM 5 value is recommended in order to allow maximum battery conservation without impacting the quality. Using a lower DTIM value is possible but will reduce the standby time slightly.

    - First find the WLAN number in your system:

    get wlanlist rkscli: get wlanlist name status type wlanID radioID bssid ----------------------------------------------------------- wlan0 up AP wlan0 0 00:1d:2e:02:79:09 wlan1 up AP wlan1 0 00:1d:2e:42:79:09 Then apply the setting to all voice WLANs.

    set dtim-period wlan0 5 set dtim-period wlan1 5 The dtim-period setting can be done either by SSH to each access point or via the controller to all access points with the command below.

    debug#remote_ap_cli -A set dtim-period wlan0 5 debug#remote_ap_cli -A set dtim-period wlan1 5

    Qtime To increase the battery standby time Ascom and Ruckus recommends that the qtime parameter is adjusted. This will increase the standby time from ~40hours to ~100hours.

    - Apply setting to the desired radio (2.4/5GHz) or both: set mq wifi0 qtime 2000 2000 4000 4000 set mq wifi1 qtime 2000 2000 4000 4000 The qtime setting can be done either by SSH to each access point or via the controller to all access points with the command below.

    debug#remote_ap_cli -A set mq wifi0 qtime 2000 2000 4000 4000 debug#remote_ap_cli -A set mq wifi1 qtime 2000 2000 4000 4000

  • Interoperability Report - Ascom i62 – Ruckus Wireless 16 2016-09-15

    Ascom i62 Recommended i62 setting.

    Network settings for WPA2-PSK

  • Interoperability Report - Ascom i62 – Ruckus Wireless 17 2016-09-15

    Network settings for .1X authentication (PEAP-MSCHAPv2)

    If 802.1X Authentication is used a root certificate has to be uploaded to the phone by “right clicking” - > Edit certificates. EAP-TLS will require both a CA and a client certificate. Note that both a CA certificate and a client certificate are needed for TLS. Otherwise only a CA certificate is needed. Server certificate validation can be overridden in version 4.1.12 and above per handset setting.

  • Interoperability Report - Ascom i62 – Ruckus Wireless 18 2016-09-15

    Innovaphone IP6000 (IP PBX) The Innovaphone IP6000 was configured with a static IP. Signaling is less relevant here since testing homes in on interoperability in relation to the WLAN infrastructure and not features of the IP PBX. During the tests the IP6000 also was used as DHCP server. IP6000 configuration: See attached file (complete-IP6000-08-03-a6.txt) for IP6000 configuration

  • Interoperability Report - Ascom i62 – Ruckus Wireless 19 2016-09-15

    APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 17 Fail 0 Comments 0 Untested 4 Total 21 See attached file (WLANinteroperabilityTestReport_Ruckus_9_13.xls) for detailed test results. Please refer to the test specification for WLAN systems on Ascom’s interoperability web page for explicit information regarding each test case. See URL (requires login): https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability

  • Interoperability Report - Ascom i62 – Ruckus Wireless 20 2016-09-15

    Document History Rev Date Author DescriptionP1 2016-09-01 SEKMO Draft 1. Ruckus ZD 9.13.0.0.232 R1 2016-09-13 SEKMO Review and correction. Revision 1.

    WLAN TR

    WLAN Interoperability Test ReportWLAN configuration:

    Beacon Interval: 100ms

    Test object - Handset:DTIM Interval: 5

    Ascom i62 5.5.0802.11d Regulatory Domain: World

    Test object - WLAN system:WMM Enabled (Auto/WMM)

    Ruckus Smartzone 9.13.0.0.232No Auto-tune

    AP R710,R500, R310, ZF7982, ZF7372R710R500R31079827372Single Voice VLAN

    2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz

    Test CaseDescriptionVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictComment

    TEST AREA ASSOCIATION / AUTHENTICATION

    #101Association with open authentication, no encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS

    #107Association with WPA2-PSK authentication, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS

    #110Association with PEAP-MSCHAPv2 auth, AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFreeRADIUS server; RootCA loaded to device; Handset autheticates twiceFAIL

    #116Association with EAP-TLS authenticationPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFreeRADIUS server; RootCA and clients certificate loaded to device

    TEST AREA POWER-SAVE AND QOSPASS

    #150802.11 Power-save modePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFAIL

    #151Beacon period and DTIM intervalPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSOny DTIM 1, 5 tested due to configuration via CLI. Beacon Period 100tuNOT TESTED

    #152802.11e U-APSDPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSSee Comment

    #202WMM prioritizationPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSiperf used to generate backgound load.

    TEST AREA "PERFORMANCE"

    #308Power-save mode U-APSD – WPA2-PSKPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS12hs ok on one single radio. Note that 12 was not the limit.

    #310CAC - TSPECNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    TEST AREA ROAMING AND HANDOVER TIMES

    #401Handover with open authentication and no encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSAVG roaming time 11an: 23 ms, bgn: 23ms (No significant difference seen in roaming times between different AP models)

    #404Handover with WPA2-PSK auth and AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSAVG roaming time 11an:50ms, bgn:56 ms (No significant difference seen in roaming times between different AP models)

    #408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSAVG roaming time 11an: 49 ms, bgn: 55ms (No significant difference seen in roaming times between different AP models)

    #411Handover using PMKSA and opportunistic/proactive key cachingPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSOKC always on. Same test as #408

    TEST AREA BATTERY LIFETIME

    #501Battery lifetime in idleNOT TESTEDNOT TESTEDPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED80-95hours. DTM 5. Non-DFS channels only. QTIME had to be changed for optimal battery life

    #504Battery lifetime in call with power save mode U-APSDPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS10-13h, Non-DFS channels, DTIM 5, Qtime optimized

    TEST AREA STABILITY

    #602Duration of call – U-APSD modePASSPASSPASSPASSPASSPASSPASSPASSPASSPASS1h+ call maintained

    TEST AREA 802.11n

    #801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTED

    #802Frame aggregation A-MPDUPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSUplink and downlink.

    #80440Mhz channelsNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDonly 20MHz channel width tested on 2.4GHz band

    #805802.11n ratesPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSUplink and downlink.

    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2016.09.13 15:34:07 =~=~=~=~=~=~=~=~=~=~=~=show techsupport

    System Overview:

    Name= ruckus

    IP Address= 192.168.0.18

    MAC Address= 00:22:7F:0C:38:7A

    Uptime= 34d 6h 2m

    Model= ZD3025

    Licensed APs= 25

    Serial Number= 320833000446

    Version= 9.13.0.0 build 232

    Devices Overview:

    Number of APs= 1

    Number of Client Devices= 8

    Number of Rogue Devices= 85

    Usage Summary:

    Usage of 1 hr:

    Max. Concurrent Users= 8

    Bytes Transmitted= 20.09M

    Number of Rogue Devices= 85

    Usage of 24 hr:

    Max. Concurrent Users= 9

    Bytes Transmitted= 648.50M

    Number of Rogue Devices= 98

    Memory Utilization:

    Used Bytes= 65228(kB)

    Used Percentage= 7%

    Free Bytes= 966264(kB)

    Free Percentage= 93%

    Protocol Mode= IPv4-Only

    Device IP Address:

    Mode= Manual

    IP Address= 192.168.0.18

    Netmask= 255.255.255.0

    Gateway Address= 192.168.0.50

    Primary DNS=

    Secondary DNS=

    Management VLAN:

    VLAN ID= 1

    Country Code:

    Code= United States

    Identity:

    Name= ruckus

    Session Statistics:

    Enable= false

    Limited Unauthorized Session= true

    NTP:

    Status= Enabled

    Address= ntp.ruckuswireless.com

    Timezone= GMT

    Log:

    Status= Disabled

    Address=

    Facility=

    Priority=

    AP Facility=

    AP Priority=

    event log level= 3

    Tunnel MTU:

    Tunnel MTU= 1500

    Bonjour Service:

    Status= Enabled

    Telnet Server:

    Status= Disabled

    FTP Server:

    Status= Enabled

    Anonynous Status= Disabled

    FlexMaster:

    Status= Disabled

    Address=

    Interval= 15

    login warning:

    Status= Disabled

    content= "Warning, you are logging into device for authorized user only. If you are not an authorized user, please click Quit; otherwise click Continue to login."

    AAA:

    ID:

    1:

    Name= Local Database

    Type= Local

    2:

    Name= Guest Accounts

    Type= Guest

    3:

    Name= Interop

    Type= RADIUS server

    Auth Method= pap

    Primary RADIUS:

    IP Address= 192.168.0.2

    Port= 1812

    Secret= ********

    Secondary RADIUS:

    Status= Disabled

    Retry Policy:

    Request Timeout= 3 Seconds

    Max. Number of Retries= 2 Times

    DHCP servers for DHCP relay agent:

    Administrator Name/Password:

    Name= admin

    Password= ********

    Authenticate:

    Mode= Authenticate using the admin name and password

    Management ACL:

    AP:

    ID:

    1:

    MAC Address= f8:e7:1e:01:9a:a0

    Model= r500

    Approved= Yes

    Device Name= RuckusAPR500

    Description=

    Location=

    GPS=

    CERT = Normal

    Bonjour-policy=

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= 165)

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 80

    Channel= 36

    WLAN Services enabled= Yes

    Tx. Power= -6dB(1/4)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 11

    WLAN Services enabled= Yes

    Tx. Power= -6dB(1/4)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= DHCP

    IP Address= 192.168.0.171

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Auto Configuration

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    LLDP:

    Status = Use Parent Setting

    Venue Name List:

    2:

    MAC Address= f8:e7:1e:0d:4f:70

    Model= r310

    Approved= Yes

    Device Name= RuckusAP R310

    Description=

    Location=

    GPS=

    CERT = Normal

    Bonjour-policy=

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 149

    WLAN Services enabled= Yes

    Tx. Power= -6dB(1/4)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 11

    WLAN Services enabled= Yes

    Tx. Power= -6dB(1/4)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= DHCP

    IP Address= 192.168.0.193

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Auto Configuration

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    LLDP:

    Status = Use Parent Setting

    Venue Name List:

    3:

    MAC Address= 58:b6:33:3b:56:60

    Model= r710

    Approved= Yes

    Device Name= RuckusAP R710

    Description=

    Location=

    GPS=

    CERT = Complex

    Bonjour-policy=

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 149

    WLAN Services enabled= Yes

    Tx. Power= -7dB

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 6

    WLAN Services enabled= Yes

    Tx. Power= -7dB

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= DHCP

    IP Address= 192.168.0.226

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Auto Configuration

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    LLDP:

    Status = Use Parent Setting

    Venue Name List:

    PoE Mode= Auto

    802.3af PoE Tx. chain= 2

    5:

    MAC Address= 24:c9:a1:04:21:60

    Model= zf7372

    Approved= Yes

    Device Name= AP7300

    Description=

    Location=

    GPS=

    CERT = Complex

    Bonjour-policy=

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 36

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 6

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= DHCP

    IP Address= 192.168.0.170

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Auto Configuration

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    LLDP:

    Status = Use Parent Setting

    Venue Name List:

    LAN Port:

    0:

    Interface= eth0

    Dot1x= None

    LogicalLink= Down

    PhysicalLink= Down

    Label= 10/100 LAN1

    1:

    Interface= eth1

    Dot1x= None

    LogicalLink= Up

    PhysicalLink= Up 100Mbps full

    Label= 10/100/1000 PoE LAN2

    6:

    MAC Address= 2c:e6:cc:1f:6a:50

    Model= zf7982

    Approved= Yes

    Device Name= AP7900

    Description=

    Location=

    GPS=

    CERT = Complex

    Bonjour-policy=

    Group Name= System Default

    Channel Range:

    A/N= 36,40,44,48,149,153,157,161 (Disallowed= )

    B/G/N= 1,2,3,4,5,6,7,8,9,10,11 (Disallowed= )

    Radio a/n:

    Channelization= 40

    Channel= 44

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Radio b/g/n:

    Channelization= 20

    Channel= 1

    WLAN Services enabled= Yes

    Tx. Power= -9dB(1/8)

    WLAN Group Name= Default

    Call Admission Control= 10% airtime usage limit

    SpectraLink Compatibility= Disabled

    Override global ap-model port configuration= No

    Network Setting:

    Protocol mode= Use Parent Setting

    Device IP Settings= Keep AP's Setting

    IP Type= DHCP

    IP Address= 192.168.0.198

    Netmask= 255.255.255.0

    Gateway= 192.168.0.50

    Primary DNS Server=

    Secondary DNS Server=

    Device IPv6 Settings= Keep AP's Setting

    IPv6 Type= Auto Configuration

    IPv6 Address= fc00::1

    IPv6 Prefix Length= 7

    IPv6 Gateway=

    IPv6 Primary DNS Server=

    IPv6 Secondary DNS Server=

    Mesh:

    Status= Disabled

    LLDP:

    Status = Use Parent Setting

    Venue Name List:

    Smart Redundancy:

    Status= Disabled

    Peer IP/IPv6 Address=

    Shared Secret=

    IPv4 Management Interface:

    Status= Disabled

    IP Address=

    Netmask=

    Gateway Status= Disabled

    Gateway Address=

    VLAN= 1

    IPv6 Management Interface:

    Status= Disabled

    IPv6 Address=

    IPv6 Prefix=

    Gateway Status= Disabled

    Gateway Address=

    VLAN= 1

    L2/MAC ACL:

    ID:

    1:

    Name= System

    Description= System

    Restriction= Deny only the stations listed below

    Stations:

    SNMP Agent:

    Status= Disabled

    Contact= [email protected]

    Location= 880 W Maude Ave. Sunnyvale, CA 94085 US

    RO Community= public

    RW Community= private

    SNMP Trap:

    Format= Version2

    Status= Disabled

    SNMPV3 Agent:

    Status= Disabled

    Ro:

    User=

    Authentication Type= MD5

    Authentication Pass Phrase=

    Privacy Type= DES

    Privacy Phrase=

    Rw:

    User=

    Authentication Type= MD5

    Authentication Pass Phrase=

    Privacy Type= DES

    Privacy Phrase=

    SNMP Trap:

    Format= Version3

    Status= Disabled

    WLAN Service:

    ID:

    1:

    NAME = RuckusIntopZDPSK

    Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps

    Tx. Rate of Management Frame(5GHz) = 6.0Mbps

    Beacon Interval = 100ms

    SSID = RuckusIntopZDPSK

    Description = RuckusIntopZDPSK

    Type = Standard Usage

    Authentication = open

    Encryption = wpa2

    Algorithm = aes

    Passphrase = comptest

    FT Roaming = Disabled

    802.11k Neighbor report = Disabled

    Web Authentication = Disabled

    Authentication Server = Disabled

    Called-Station-Id type = wlan-bssid

    Tunnel Mode = Disabled

    Background Scanning = Enabled

    Max. Clients = 100

    Isolation per AP = Disabled

    Isolation across AP = Disabled

    Zero-IT Activation = Enabled

    Priority = High

    Load Balancing = Enabled

    Band Balancing = Enabled

    Dynamic PSK = Disabled

    Rate Limiting Uplink = Disabled

    Rate Limiting Downlink = Disabled

    Auto-Proxy configuration:

    Status = Disabled

    Inactivity Timeout:

    Status = Enabled

    Timeout = 5 Minutes

    VLAN-ID = 1

    Dynamic VLAN = Disabled

    Closed System = Disabled

    Https Redirection = Disabled

    OFDM-Only State = Disabled

    Multicast Filter State = Disabled

    802.11d State = Enabled

    Force DHCP State = Disabled

    Force DHCP Timeout = 10

    DHCP Option82:

    Status = Disabled

    Option82 sub-Option1 = Disabled

    Option82 sub-Option2 = Disabled

    Option82 sub-Option150 = Disabled

    Option82 sub-Option151 = Disabled

    Ignore unauthorized client statistic = Disabled

    STA Info Extraction State = Enabled

    BSS Minrate = Disabled

    Call Admission Control State = Disabled

    PMK Cache Timeout= 720 minutes

    PMK Cache for Reconnect= Enabled

    NAS-ID Type= wlan-bssid

    Roaming Acct-Interim-Update= Disabled

    PAP Message Authenticator = Enabled

    Send EAP-Failure = Disabled

    L2/MAC = No ACLS

    L3/L4/IP Address = No ACLS

    L3/L4/IPv6 Address = No ACLS

    Precedence = Default

    Proxy ARP = Enabled

    Device Policy = No ACLS

    Vlan Pool = No Pools

    Role based Access Control Policy = Disabled

    SmartRoam = Disabled Roam-factor = 1

    White List = No ACLS

    Application Visibility = disabled

    Apply Policy Group = No_Denys

    2:

    NAME = RuckusIntopZD1X

    Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps

    Tx. Rate of Management Frame(5GHz) = 6.0Mbps

    Beacon Interval = 100ms

    SSID = RuckusIntopZD1X

    Description = RuckusIntopZD1X

    Type = Standard Usage

    Authentication = 802.1x-eap

    Encryption = wpa2

    Algorithm = aes

    Passphrase =

    FT Roaming = Disabled

    802.11k Neighbor report = Disabled

    Web Authentication = Disabled

    Authentication Server = Interop

    Called-Station-Id type = wlan-bssid

    Tunnel Mode = Disabled

    Background Scanning = Enabled

    Max. Clients = 100

    Isolation per AP = Disabled

    Isolation across AP = Disabled

    Zero-IT Activation = Disabled

    Priority = High

    Load Balancing = Disabled

    Band Balancing = Disabled

    Dynamic PSK = Disabled

    Rate Limiting Uplink = Disabled

    Rate Limiting Downlink = Disabled

    Auto-Proxy configuration:

    Status = Disabled

    Inactivity Timeout:

    Status = Enabled

    Timeout = 5 Minutes

    VLAN-ID = 1

    Dynamic VLAN = Disabled

    Closed System = Disabled

    Https Redirection = Disabled

    OFDM-Only State = Disabled

    Multicast Filter State = Disabled

    802.11d State = Enabled

    Force DHCP State = Disabled

    Force DHCP Timeout = 10

    DHCP Option82:

    Status = Disabled

    Option82 sub-Option1 = Disabled

    Option82 sub-Option2 = Disabled

    Option82 sub-Option150 = Disabled

    Option82 sub-Option151 = Disabled

    Ignore unauthorized client statistic = Disabled

    STA Info Extraction State = Enabled

    BSS Minrate = Disabled

    Call Admission Control State = Disabled

    PMK Cache Timeout= 720 minutes

    PMK Cache for Reconnect= Enabled

    NAS-ID Type= wlan-bssid

    Roaming Acct-Interim-Update= Disabled

    PAP Message Authenticator = Enabled

    Send EAP-Failure = Disabled

    L2/MAC = No ACLS

    L3/L4/IP Address = No ACLS

    L3/L4/IPv6 Address = No ACLS

    Precedence = Default

    Proxy ARP = Disabled

    Device Policy = No ACLS

    Vlan Pool = No Pools

    Role based Access Control Policy = Disabled

    SmartRoam = Disabled Roam-factor = 1

    White List = No ACLS

    Application Visibility = disabled

    Apply Policy Group = No_Denys

    3:

    NAME = RuckusIntopZDOPEN

    Tx. Rate of Management Frame(2.4GHz) = 2.0Mbps

    Tx. Rate of Management Frame(5GHz) = 6.0Mbps

    Beacon Interval = 100ms

    SSID = RuckusIntopZDOPEN

    Description = RuckusIntopZDOPEN

    Type = Standard Usage

    Authentication = 802.1x-eap

    Encryption = wpa2

    Algorithm = aes

    Passphrase =

    FT Roaming = Disabled

    802.11k Neighbor report = Disabled

    Web Authentication = Disabled

    Authentication Server = Local Database

    Called-Station-Id type = wlan-bssid

    Tunnel Mode = Disabled

    Background Scanning = Enabled

    Max. Clients = 100

    Isolation per AP = Disabled

    Isolation across AP = Disabled

    Zero-IT Activation = Disabled

    Priority = High

    Load Balancing = Enabled

    Band Balancing = Enabled

    Dynamic PSK = Disabled

    Rate Limiting Uplink = Disabled

    Rate Limiting Downlink = Disabled

    Auto-Proxy configuration:

    Status = Disabled

    Inactivity Timeout:

    Status = Enabled

    Timeout = 5 Minutes

    VLAN-ID = 1

    Dynamic VLAN = Disabled

    Closed System = Disabled

    Https Redirection = Disabled

    OFDM-Only State = Disabled

    Multicast Filter State = Disabled

    802.11d State = Enabled

    Force DHCP State = Disabled

    Force DHCP Timeout = 10

    DHCP Option82:

    Status = Disabled

    Option82 sub-Option1 = Disabled

    Option82 sub-Option2 = Disabled

    Option82 sub-Option150 = Disabled

    Option82 sub-Option151 = Disabled

    Ignore unauthorized client statistic = Disabled

    STA Info Extraction State = Enabled

    BSS Minrate = Disabled

    Call Admission Control State = Disabled

    PMK Cache Timeout= 720 minutes

    PMK Cache for Reconnect= Enabled

    NAS-ID Type= wlan-bssid

    Roaming Acct-Interim-Update= Disabled

    PAP Message Authenticator = Enabled

    Send EAP-Failure = Disabled

    L2/MAC = No ACLS

    L3/L4/IP Address = No ACLS

    L3/L4/IPv6 Address = No ACLS

    Precedence = Default

    Proxy ARP = Enabled

    Device Policy = No ACLS

    Vlan Pool = No Pools

    Role based Access Control Policy = Disabled

    SmartRoam = Disabled Roam-factor = 1

    White List = No ACLS

    Application Visibility = disabled

    Apply Policy Group = No_Denys

    WLAN Group:

    ID:

    1:

    Name= Default

    Description= Default WLANs for Access Points

    WLAN Service:

    WLAN1:

    NAME= RuckusIntopZDPSK

    VLAN=

    WLAN2:

    NAME= RuckusIntopZD1X

    VLAN=

    WLAN3:

    NAME= RuckusIntopZDOPEN

    VLAN=

    Mosquitto bridge global index file does not exist!

    Debug Logs:

    All= Disabled

    Sys-mgmt= Disabled

    Mesh= Disabled

    Web-auth= Disabled

    Rf-mgmt= Disabled

    Radius= Disabled

    Hotspot-srv= Disabled

    Aps= Disabled

    Net-mgmt= Disabled

    802.1x= Disabled

    Web-svr= Disabled

    802.11= Disabled

    Dvlan= Disabled

    Smart-redundancy= Disabled

    Client-association= Disabled

    Debug logs of specified MAC address:

    Status= Disabled

    ruckus#