Title | Size | Downloads |
---|---|---|
book.pdf | 239.28 KB |
- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
book | 239.28 KB |
Access Controller Module LSWM1WCM20
1 Overview
The H
2 Hardware Features of the LSWM1WCM20
(1) Appearance
The silkscreen LSWM1WCM20 is printed at the upper left corner of the front panel, which is used to identify the module. The following figure depicts the appearance of the module.
Figure-1 Appearance of the LSWM1WCM20
(2) Specifications
The LSWM1WCM20 can provide wireless features for the S5800 series switches. It provides one 10/100Base-TX interface for out-of-band management. The following figure depicts the front panel of the LSWM1WCM20.
Figure-2 Front panel of the LSWM1WCM20
Table1 LSWM1WCM20 specifications
Item | Specification |
CPU frequency | 1 GHz |
CF card | 128 MB |
Capacity | 512MB DDRII |
Dimensions (H × W × D) | 36.6 × 221.0 × |
Power consumption | 15.6 W to 17.8 W |
Weight | |
Interface | One 10/100Base-T management Ethernet port |
Interface transmission rate | 10/100Mbps autosensing, full-duplex |
Operating temperature | |
Operating humidity (noncondensing) | 10% to 95% |
Applicable device model | S5800 |
3 Software Features of the LSWM1WCM20
Table2 Software features of the LSWM1WCM20
Item | Description | ||
Network interconnection | 802.3 LAN protocols | ARP (gratuitous | |
ARP fast-reply | |||
VLAN (port/MAC-based VLANs) | |||
SSID/AP based VLANs | |||
802.1p, 802.1q, 802.1X, 802.3x | |||
Port loopback | |||
Port broadcast storm suppression | |||
IP application | Ping, Tracert | ||
DHCP server, DHCP client, DHCP relay agent, DHCP snooping | |||
DNS client | |||
NTP | |||
Telnet | |||
TFTP client | |||
FTP client, FTP server | |||
IP routing | Static routing | ||
Multicasting | IGMP snooping | ||
MLD snooping | |||
IPv6 | TCPv6, UDPv6, ICMPv6 | ||
IPv6 ND | |||
Pingv6, Tracertv6 | |||
Telnetv6 | |||
DNSv6 | |||
IPv6 PMTU | |||
IPv6 FIB | |||
IPv6 ACL | |||
IPv6 static routing | |||
WLAN | 802.11 | 802.11, 802.11 , 802.11b, | |
RF management | Transmission rate selection | ||
Transmission rate auto-adjustment | |||
Manual and automatic channel configuration; radar avoidance | |||
Maximum transmission power configuration | |||
Manual and automatic transmission power configuration | |||
Country code configuration | |||
Coverage hole correction | |||
Wireless RF interference detection and mitigation | |||
Roaming | Intra-AC roaming | ||
Inter-AC roaming | |||
Key cache fast roaming | |||
CAPWAP | Layer 2/Layer 3 network topology between AP and AC | ||
Automatic AC discovery by APs | |||
AP software version upgrade through the AC | |||
AP configuration file download from the AC | |||
IPv4/IPv6 networks supported between AP and AC | |||
Traffic and user number based AP load sharing | |||
Centralized and local forwarding modes | |||
Network security | Security authentication | MAC address authentication | |
802.1X authentication (EAP-TLS, EAP-TTLS, EAP-PEAP, EAP-SIM, EAP-MD5) | |||
Portal authentication (both embedded portal server and external portal server supported) | |||
PPPoE authentication | |||
Wireless EAD | |||
User profile based on QACL, bandwidth control and permitted AP/SSID | |||
AAA | RADIUS | ||
LDAP (portal authentication) | |||
HWTACACS | |||
Local authentication: l 802.1X authentication (MD5/TLS/PEAP-MSCHAPv2) l Portal authentication l MAC address authentication | |||
Multi-domain configuration on the authentication server | |||
Backup authentication server | |||
ESS based authentication server selection | |||
SSID-to-user account binding | |||
VLAN/ACL/User profile-to-user account binding | |||
802.11 security and privacy | Multi-SSID support | ||
SSID hiding | |||
802.11i | |||
WPA , WPA2 | |||
WEP (WEP64/WEP128) | |||
TKIP | |||
CCMP | |||
WIDS/WIPS | Whitelist | ||
Static/dynamic blacklist | |||
Detection of and countermeasures against rogue wireless devices | |||
Wireless attack prevention | |||
Others | SSH V1.5/2.0 | ||
Isolation of users | |||
User management |
| User-based bandwidth limit | |
User-based access control | |||
User-based QoS | |||
Reliability | N+1 redundancy | ||
N+N redundancy | |||
QoS | Layer-2 QoS | Layer 2-4 packet filtering and traffic classification | |
User-based packet filtering and traffic classification | |||
Ethernet interface/SSID based priority | |||
Mapping between wired priority and wireless priority | |||
Mapping between wireless priority and CAPWAP tunnel priority | |||
Traffic policing | CAR/LR | ||
Flow-based bandwidth control | |||
CAPWAP tunnel based bandwidth control | |||
User/SSID based intelligent bandwidth control | |||
User-based bandwidth control (AAA authorization) | |||
Congestion management | FIFO, PQ, CQ | ||
Wireless QoS | WMM (802.11e) | ||
Maintainability | Network management | SNMP V1/V | |
Syslog | |||
RMON | |||
User access management | Console port login | ||
Telnet (VTY) login | |||
SSH login | |||
Web-based management | |||
FTP login | |||
System management | File system management | ||
Application program backup (dual image) | |||
Hotfix | |||
4 Installing and Removing the LSWM1WCM20
Avoid touching any components on the module during the installation or removal process. It is recommended to wear an ESD-preventive wrist strap and ESD-preventive gloves before installation.
The LSWM1WCM20 is hot swappable. You need to install the LSWM1WCM
Installing the LSWM1WCM20
(1) Face the switch’s panel where the interface card slot is located.
(2) Choose an empty slot and remove the filler panel.
(3) Push the access controller module into the slot along the guide rails until the positioning hole of the module is seated onto the positioning pin on the backplane.
(4) Push the ejector levers inward to lock the access controller module in place.
(5) Fasten the captive screws on the access controller module with a Philips screwdriver.
Figure-3 Installing the LSWM1WCM20
Removing the LSWM1WCM20
(1) Face the switch’s panel where the interface card slot is located.
(2) Loosen the captive screws on the access controller module with a Philips screwdriver until all spring pressure is released.
(3) Hold the ejector levers of the access controller module and push them outward.
(4) Gently pull the access controller module out of the slot along the guide rails.
After removing a module, if no new module is to be installed, install the filer panel on the slot to prevent dust and ensure normal ventilation in the switch.
5 Upgrading the LSWM1WCM20
The LSWM1WCM20 has its own Boot ROM program and application program with a Boot ROM menu different from that of the S5800 series switches. To update the application program of the LSWM1WCM20, use one of the following ways:
(1) Local update through the Boot ROM menu
l Use the TFTP protocol through the 10/100Base-TX Ethernet port of the LSWM1WCM20
l Use the FTP protocol through the 10/100Base-TX Ethernet port of the LSWM1WCM20
(2) Remote update through CLI
l Use the FTP protocol through the Ethernet port of the switch
l Use the TFTP protocol through the Ethernet port of the switch
For how to upgrade the LSWM1WCM20, refer to H
6 Logging in to the LSWM1WCM20
Using the following command on a switch, you can to log in to the software system of the LSWM1WCM20 (OAP card), and the switch’s command line interface (CLI) will switch to the software system operating interface of the LSWM1WCM20. Thus, you can manage the application software of LSWM1WCM20 on the switch.
Press the shortcut key Ctrl + K to return to the CLI of the switch.
Table3 Log in to the software system of the LSWM1WCM20 from a switch
To do… | Use the command… | Remarks |
Log in to the software system of the LSWM1WCM20 from a switch | mcms connect slot slot-number system system-name | Required Available in user view. |
Besides the above-mentioned OAP login method, you can log in to the LSWM1WCM20 through telent, web page, or NMS. For details, refer to the Login Volume of the H
7 Guidelines
l If the host software version does not match the access controller module, contact the sales agent or the integrator for the right version.
l For how to upgrade the host software version, refer to the related part in H
l The types and specifications of the access controller modules may vary with product versions. For the latest documentation, go to Technical Support & Document > Technical Documents on H
8 Related Manuals
Manual | Description |
H | Provides a guide to the operation of H |
H | Introduces the Web-based management function of the WX series access controllers. |
H | Briefly introduces the appearance, installation, startup, maintenance, troubleshooting and lightning protection of the H |
H | Elaborates the appearance, installation, startup, software loading, troubleshooting, maintenance and lightning protection of the H |
Copyright © 2009 Hangzhou H