Error Txop Max Rate Must Be in the Range 0 to 65535 Try Again
Wireless
This chapter describes how to configure the wireless radio properties. It includes the following topics:
Radio
The radio is the physical part of the WAP that creates a wireless network. The radio settings on the WAP control the behavior of the radio and determine what kind of wireless signals the WAP emits.
To configure the wireless radio settings:
Procedure
| Step 1 | Select Wireless > Radio. | ||||
| Step 2 | Radio Interface:
| ||||
| Step 3 | In the radio setting per interface area, select the radio interface to which the configuration parameters will be applied. | ||||
| Step 4 | In the Basic Settings area, configure these parameters for the selected radio interface:
| ||||
| Step 5 | In the Advanced Settings area, configure these parameters:
| ||||
| Step 6 | Click Configure TSPEC and configure the following parameters:
| ||||
| Step 7 | Click OK and then click Apply. |
Networks
Virtual Access Points (VAPs), segment the wireless LAN into multiple broadcast domains that are wireless equivalent of the Ethernet VLANs. VAPs simulate multiple access points on one physical WAP device. Up to four VAPs are supported on this Cisco WAP device.
Each VAP can be independently enabled or disabled, with the exception of VAP0. The VAP0 is the physical radio interface and remains enabled as long as the radio is enabled. To disable the VAP0, the radio itself must be disabled.
Each VAP is identified by a user-configured Service Set Identifier (SSID). Multiple VAPs cannot have the same SSID name. SSID broadcasts can be enabled or disabled independently on each VAP. SSID broadcast is enabled by default.
SSID Naming Conventions
The default SSID for VAP0 is ciscosb. Every additional VAP created has a blank SSID name. The SSIDs for all VAPs can be configured to other values. The SSID can be any alphanumeric, case-sensitive entry from 2 to 32 characters.
The following characters are allowed:
-
ASCII 0x20 through 0x7E.
-
Trailing and leading spaces (ASCII 0x20) are not permitted.
Note | This means that spaces are allowed within the SSID, but not as the first or last character including the period "." (ASCII 0x2E). |
VLAN IDs
Each VAP is associated with a VLAN, and is identified by a VLAN ID (VID). A VID can be any value from 1 to 4094, inclusive. The WAP150/361 device supports 33 active VLANs (32 for WLAN plus one management VLAN).
By default, the VID assigned to the configuration utility for the WAP device is 1, which is also the default untagged VID. If the management VID is the same as the VID assigned to a VAP, then the WLAN clients associated with this specific VAP can administer the WAP device. If needed, an access control list (ACL) can be created to disable administration from WLAN clients.
Configuring VAPs
To configure VAPs:
Procedure
| Step 1 | Select Wireless > Networks. | ||||
| Step 2 | In the Radio field, click the radio interface (Radio 1 or Radio 2) to which the VAP configuration parameters are applied. | ||||
| Step 3 | If VAP0 is the only VAP configured on the system, and you want to add a VAP, click ✚. Then, check the VAP. | ||||
| Step 4 | Configure the following:
If you choose a security mode other than None, additional fields appear. For more information on configuring the wireless security settings, see Configuring Security Settings. We recommend using WPA Personal or WPA Enterprise as the authentication type as it provides stronger security protection.
| ||||
| Step 5 | Click Apply.
|
Configuring Security Settings
This section describes the security settings that can be configured on the WAP device on the Networks page. There are three security setting options to choose from: None, WPA Personal and WPA Enterprise.
None
If you select None as your security mode, no additional security settings are required on the device. This mode means that any data transferred to and from the WAP device is not encrypted. This security mode can be used during initial network configuration or for troubleshooting, but the same is not recommended for a regular use on the internal network as this mode is not secure.
WPA Personal
The WPA Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes AES-CCMP and TKIP encryption. The WPA Personal uses a pre-shared key (PSK) instead of using IEEE 802.1X and EAP as is used in the Enterprise WPA security mode. The PSK is used for an initial check of credentials only. WPA Personal is also referred to as WPA-PSK.
This security mode is backwards-compatible for the wireless clients that support the original WPA.
To configure WPA Personal, configure the following:
-
WPA Versions — Choose the types of client stations from the following:
-
WPA-TKIP — This network has client stations that only support the original WPA and TKIP security protocol. Note that selecting the WPA-TKIP only is not allowed as per the latest Wi-Fi Alliance requirements.
-
WPA2-AES — All client stations on the network support WPA2 and AES-CCMP cipher/security protocol. This provides the best security per IEEE 802.11i standard. As per the latest Wi-Fi Alliance requirement, the AP has to support this mode all the time.
If the network has a mix of clients, some of which support WPA2 and others which support only the original WPA, select both. This lets both WPA and WPA2 client stations associate and authenticate, but uses the more robust WPA2 for clients who support it. This WPA configuration allows more interoperability in place of some security.
WPA clients must have one of these keys to be able to associate with the WAP device:
-
A valid TKIP key
-
A valid AES-CCMP key
-
-
-
PMF (Protection Management Frame) — Provides security for the unencrypted 802.11 management frames. When Security Mode is disabled, the PMF is set to No PMF and is not editable (Hidden or Grey). When the security Mode is set to WPA2-xxx, the PMF is Capable by default and is editable. The following three check box values can be configured for it.
-
Not Required
-
Capable
-
Required
Note
The WiFi Alliance requires the PMF to be enabled and set to Capable (Default). You may disable it when the non-compliant wireless clients experience instability or connectivity issues.
-
-
Key — The shared secret key for WPA Personal security. Enter a string of at least 8 characters to a maximum of 63 characters. Acceptable characters include uppercase and lowercase alphabetic letters, the numeric digits, and special symbols such as @ and #.
-
Show Key as Clear Text —When enabled, the text you type is visible. When disabled, the text is not masked as you enter it.
-
Key Strength Meter — The WAP device checks the key against complexity criteria such as how many different types of characters (uppercase and lowercase alphabetic letters, numbers, and special characters) are used and how long is the string. If the WPA-PSK complexity check feature is enabled, the key is not accepted unless it meets the minimum criteria. See Configure WAP-PSK Complexity for information on configuring the complexity check.
-
Broadcast Key Refresh Rate — The interval at which the broadcast (group) key is refreshed for clients associated with this VAP. The default is 86400 seconds and the valid range is from 0 to 86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.
WPA Enterprise
The WPA Enterprise with RADIUS is an implementation of the Wi-Fi Alliance IEEE 802.11i standard, which includes CCMP (AES), and TKIP encryption. The Enterprise mode requires the use of a RADIUS server to authenticate the users.
This security mode is backwards-compatible with the wireless clients that support the original WPA.
The dynamic VLAN mode is enabled by default, which allows RADIUS authentication server to decide which VLAN is used for the stations.
These parameters configure WPA Enterprise:
-
WPA Versions — Choose the types of client stations to be supported. The options are:
-
WPA-TKIP — The network has some client stations that only support original WPA and TKIP security protocol. Note that selecting only WPA-TKIP for the access point is not allowed as per the latest Wi-Fi Alliance requirement.
-
WPA2-AES — All client stations on the network support WPA2 version and AES-CCMP cipher/ security protocol. This provides the best security per the IEEE 802.11i standard. As per the latest Wi-Fi Alliance requirement, the AP has to support this mode all the time.
-
-
Enable Pre-authentication — If you choose only WPA2 or both WPA and WPA2 as the WPA version, you can enable pre-authentication for the WPA2 clients.
Check this option if you want the WPA2 wireless clients to send the pre-authentication packets. The pre-authentication information is relayed from the WAP device that the client is currently using to the target WAP device. Enabling this feature can help speed up the authentication for roaming clients who connect to multiple APs.
This option does not apply if you selected WPA for WPA versions because the original WPA does not support this feature.
Client stations configured to use WPA with RADIUS must have one of these addresses and keys:
-
A valid TKIP RADIUS IP address and RADIUS key
-
A valid CCMP (AES) IP address and RADIUS key
-
-
PMF (Protection Management Frame)— Provides security for the unencrypted 802.11 management frames. When Security Mode is disabled or WEP, the PMF is set to No PMF and is not editable (Hidden or Grey).When the security Mode is set to WPA2-xxx, the PMF is Capable by default and is editable. The following three check box values can be configured for it.
-
Not Required
-
Capable
-
Required
Note
WiFi Alliance requires PMF to be enabled with default setting of Capable. You may disable it when non-compliant wireless clients experience instability or connectivity issues.
-
-
Use Global RADIUS Server Settings — By default, each VAP uses the global RADIUS settings that you define for the WAP device. However, you can configure each VAP to use a different set of RADIUS servers.
Check this option to use the global RADIUS server settings, or uncheck this option to use a separate RADIUS server for the VAP and enter the RADIUS server IP address and key in the appropriate fields.
-
Server IP Address Type — The IP version that the RADIUS server uses. You can toggle between the address types to configure the IPv4 and IPv6 global RADIUS address settings, but the WAP device contacts only the RADIUS server or servers for the address type that you select in this field.
-
Server IP Address-1 or Server IPv6 Address-1 — The address for the primary RADIUS server for this VAP.
-
Server IP Address-2 or Server IPv6 Address-2 — Up to three IPv4 and/or IPv6 addresses to use as the backup RADIUS servers for this VAP. If authentication fails with the primary server, each configured backup server is tried in sequence.
-
Key-1 — The shared secret key for the global RADIUS server. You can use up to 63 standard alphanumeric and special characters. The key is case sensitive, and you must configure the same key on the WAP device and on your RADIUS server. The text that you enter is shown as asterisks to prevent others from seeing the RADIUS key as you type.
-
Key-2 — The RADIUS key associated with the configured backup RADIUS servers. The server at Server IP (IPv6) Address 2 uses Key 2.
-
Enable RADIUS Accounting — Tracks and measures the resources a particular user has consumed such as system time, amount of data transmitted and received, and so on. If you enable RADIUS accounting, it is enabled for the primary RADIUS server and all backup servers.
-
Active Server — Enables the administrative selection of the active RADIUS server, rather than having the WAP device attempt to contact each configured server in sequence and choose the first server that is up.
-
Broadcast Key Refresh Rate — The interval at which the broadcast (group) key is refreshed for clients associated with this VAP. The default is 86400 seconds. The valid range is from 0 to 86400 seconds. A value of 0 indicates that the broadcast key is not refreshed.
-
Session Key Refresh Rate — The interval at which the WAP device refreshes session (unicast) keys for each client associated with the VAP. The valid range is from 30 to 86400 seconds. A value of 0 indicates that the session key is not refreshed. The default value is 0.
Client Filter
Client filter can be used to permit or deny listed client stations to authenticate with the WAP device. MAC authentication is configured on the Networks page. Based on the VAP configuration, the WAP device may refer to a Client filter list stored on an external RADlUS server, or may refer a Client filter list stored locally on the WAP device.
Configuring a Client Filter List Locally on the WAP device
The WAP device supports one local Client filter list only. The filter can be configured to grant access only to the MAC addresses on the list, or to deny access only to addresses on the list.
Up to 512 Client addresses can be added to the filter list.
To configure the Client filter follow these steps:
Procedure
| Step 1 | Select Wireless > Client Filter. | ||
| Step 2 | Choose how the WAP device uses the filter list:
| ||
| Step 3 | Continue entering MAC addresses until the list is complete. Click the arrow next to Associated Clients to display the list. Choose one of the MAC address and then click Add. One rule will be added to the MAC Address Table. The Associated Clients list includes the following:
| ||
| Step 4 | Click Apply. |
Configuring MAC Authentication on the Radius Server
If one or more VAPs are configured to use a Client filter you must configure the station list on the RADIUS server. The format for the list is described in this table.
| RADIUS Server Attribute | Description | Value |
| User-Name (1) | MAC address of the client station. | Valid Ethernet MAC address |
| User-Password (2) | A fixed global password used to look up a client MAC entry. | NOPASSWORD |
Scheduler
The Radio and VAP scheduler allows you to configure a rule with a specific time interval for the VAPs or radios to be operational.
You can use this feature is to schedule the radio to operate or allow access to the VAPs only during the office working hours in order to achieve security and reduce power consumption.
The WAP device supports up to 16 profiles. Only valid rules are added to the profile. Up to 16 rules are grouped together to form a scheduling profile. Periodic time entries belonging to the same profile cannot overlap.
Scheduler Profile Configuration
You can create up to 16 scheduler profile names. By default, no profiles are created.
To view the scheduler status and add a scheduler profile:
Procedure
| Step 1 | Select Wireless > Scheduler. |
| Step 2 | Check Enable to ensure that the Administrative Mode is enabled. By default it is disabled. The Scheduler Operational Status area indicates the current operation status of the Scheduler:
|
| Step 3 | To add a profile, enter a profile name in the Create a Profile Name text box and click Add. The profile name can be up to 32 alphanumeric characters. |
Profile Rule Configuration
You can configure up to 16 rules for a profile. Each rule specifies the start time, end time, and day (or days) of the week that the radio or VAP can be operational. The rules are periodic in nature and are repeated every week. A valid rule must contain all of the following parameters (days of the week, hour, and minute) for the start and end time. Rules cannot conflict; for example, you can configure one rule to start on each weekday and another to start on each weekend day, but you cannot configure one rule to begin daily and another rule to begin on weekends.
To configure a profile rule:
Procedure
| Step 1 | Choose the profile from the Select a Profile Name list. | ||
| Step 2 | Click ✚. The new rule is displayed in the Profile Rule Table. | ||
| Step 3 | Check the check box before the Profile Name and click Edit. | ||
| Step 4 | From the Day of the Week menu, choose the recurring schedule for the rule. You can configure the rule to occur daily, each weekday, each weekend day (Saturday and Sunday), or any single day of the week. | ||
| Step 5 | Set the start and end times:
| ||
| Step 6 | Click Apply.
|
QoS
The Quality of Service (QoS) settings allow for configuration of the transmission queues for optimized throughput and enhanced performance when handling differentiated wireless traffic. This traffic can be VoIP, other types of audio, video, streaming media, and traditional IP data.
To configure QoS on the WAP device, set the parameters on the transmission queues for different types of wireless traffic and specify the minimum and maximum wait times for transmission.
The WAP Enhanced Distributed Channel Access (EDCA) parameters affect the traffic flowing from the WAP device to the client station. The station EDCA parameters affect the traffic flowing from the client station to the WAP device.
In normal use, the default values for the WAP device and the station EDCA should not be changed. Changing these values affects the QoS provided.
To configure the WAP device and EDCA parameters:
Procedure
| Step 1 | Select Wireless > QoS. |
| Step 2 | Choose the radio interface (Radio 1 (5 GHz) or Radio 2 (2.4 GHz)). |
| Step 3 | Choose one of these options from the EDCA (Enhanced Distributed Channel Access) Template:
These four queues are defined for different types of data transmitted from WAP- to-station. If you choose a Custom template, the parameters that define the queues are configurable; otherwise, they are set to predefined values appropriate to your selection. The four queues are:
|
| Step 4 | Check Enable to enable Wi-Fi MultiMedia (WMM) extensions. Wi-Fi MultiMedia (WMM)— This field is enabled by default. With WMM enabled, QoS prioritization and coordination of wireless medium access is on. With WMM enabled, QoS settings on the WAP device control downstream traffic flowing from the WAP device to client station (AP EDCA parameters) and the upstream traffic flowing from the station to the AP (station EDCA parameters). Disabling WMM deactivates QoS control of station EDCA parameters on upstream traffic flowing from the station to the WAP device. With WMM disabled, you can still set some parameters on the downstream traffic flowing from the WAP device to the client station (AP EDCA parameters). |
| Step 5 | Configure the following WAP EDCA and Station EDCA parameters:
|
| Step 6 | Configure the following additional settings:
|
| Step 7 | Click Apply. |
Source: https://www.cisco.com/c/en/us/td/docs/wireless/access_point/csbap/wap150_361/Administration/Guide/EN-US/b_WAP150_361_Admin_Guide/b_WAP150_Admin_Guide_chapter_011.html
0 Response to "Error Txop Max Rate Must Be in the Range 0 to 65535 Try Again"
Post a Comment