-
Interoperability Report - Ascom i62 / Zebra Technologies 1
2016-05-13
INTEROPERABILITY REPORT Ascom i62 Zebra Technologies,
RFS/NX/VX/EX controllers AP
622/6522/650/6511/6532/7131/7522/7532/8132 Zebra Technologies WING
version 5.8.3.0
Ascom i62 and OEM derivatives version 5.5.0
Ascom, Gothenburg
May 2016
[ ]
-
Interoperability Report - Ascom i62 / Zebra Technologies 2
2016-05-13
TABLE OF CONTENT: INTRODUCTION
...........................................................................................................................
3
Ascom solution
.........................................................................................................................
3Zebra Technologies
..................................................................................................................
3SITE INFORMATION
................................................................................................................
4
SUMMARY
....................................................................................................................................
5Known issues and limitations
....................................................................................................
6Compatibility information
..........................................................................................................
6General conclusion
...................................................................................................................
6
APPENDIX A: TEST CONFIGURATIONS
....................................................................................
7Zebra Technologies RFS4000 Controller and
AP6xx/65xx/71xx/75xx/8132 Access Points..... 7
ESS, Radio and QoS settings
...............................................................................................
7Radio Configuration
..............................................................................................................
9
Ascom i62
...............................................................................................................................
15Innovaphone IP6000 (IP PBX)
................................................................................................
17
APPENDIX B: DETAILED TEST RECORDS
..............................................................................
18
-
Interoperability Report - Ascom i62 / Zebra Technologies 3
2016-05-13
INTRODUCTION This document describes necessary steps and
guidelines to optimally configure the Zebra Technologies WLAN
platform with Ascom i62 VoWiFi handsets.
The guide should be used in conjunction with both Zebra
Technologies and Ascoms configuration guide(s).
Ascom solution Ascom Wireless Solutions (www.ascom.com/ws) is a
leading provider of innovative communication solutions providing
integrated workflow intelligence for hospitals, senior care, and
independent living, and other business areas where mission-critical
communication is essential. Approximately 100 000 systems are
installed globally. The company offers a broad range of voice and
professional messaging solutions, creating value for customers by
supporting and optimizing their mission-critical communication
processes. The solutions are based on Cellular, VoWiFi, IP-DECT,
Nurse call and Paging technologies, smartly integrated via Ascom
Unite into existing enterprise systems. The company has
subsidiaries in 13 countries and 1,200 employees worldwide. Founded
in 1955 and based in Gteborg, Sweden, Ascom Wireless Solutions is
part of the Ascom Group, listed on the Swiss Stock Exchange
(ASCN:SIX).
Zebra Technologies Zebra (NASDAQ: ZBRA) makes businesses as
smart and connected as the world we live in. Zebra tracking and
visibility solutions transform the physical to digital, creating
the data streams enterprises need to simplify operations, know more
about their businesses, and empower their mobile workforces. For
more information, visit www.zebra.com
-
Interoperability Report - Ascom i62 / Zebra Technologies 4
2016-05-13
SITE INFORMATION
Test Site: Ascom US 300 Perimeter park drive Morrisville 27560
NC Participants: Karl-Magnus Olsson, Ascom HQ, Gothenburg TEST
TOPOLOGY
-
Interoperability Report - Ascom i62 / Zebra Technologies 5
2016-05-13
SUMMARY Please refer to Appendix B for detailed results for
respective access point. WLAN Controller Features
High Level Functionality Result Association, Open with No
Encryption OK Association, WPA2-PSK, AES Encryption OK Association,
PEAP-MSCHAPv2 Auth., AES Encryption OK Association, Multiple ESSIDs
OK Beacon Interval and DTIM Period OK PMKSA Caching OK
WPA2-opportunistic/proactive Key Caching OK WMM Prioritization OK
Active Mode (load test) OK 802.11 Power-save mode OK 802.11
Power-save mode (load test) OK 802.11e U-APSD OK 802.11e U-APSD
(load test) OK CAC - TSPEC OK* Roaming
High Level Functionality Result Roaming, Open with No Encryption
OK (typical roaming time 23ms) ** Roaming, WPA2-PSK, AES Encryption
OK (Typical roaming time 47ms)* * Roaming, PEAP-MSCHAPv2 Auth, AES
Encryption OK (Typical roaming time 36ms)** /***
*) Minor remark. See known issues and limitations section **)
Average roaming times are based on results from 802.11a/n. Refer to
Appendix B for detailed test results ***) Measured times is with
opportunistic/proactive Key Caching enabled (default enabled)
-
Interoperability Report - Ascom i62 / Zebra Technologies 6
2016-05-13
Known issues and limitations
Ascom i62 shows incorrect Tx power level under WLAN info
Menu.
Call admission control behavior not optimal when admission is
refused. Minor issue that has no impact for end user. Ascom is
investigating the problem in ticket WX-4026.
For additional information regarding the known issues please
contact [email protected]
Compatibility information All tests were performed on a RFS4000
running WiNG v 5.8.3.0. However, we guarantee interoperability with
all Zebra controllers running WiNG software version 5.8.3.0.
Compatible controllers. RFS4000,6000, 7000 NX45xx, 5500, 65xx,
7xxx, 9xxx VX9000 EX3xxx Compatible access points AP622, 6522, 650,
6511 AP6532, AP7131, 7522, 7532, 8132
General conclusion The result of the verified test areas, such
as authentication, association, handover and call stability test,
produced in general a good result. The roaming times, both PSK and
802.1x were excellent by ranging in the interval 30 to 50ms both
for WPA2 SPK and .1X. Performance has also been proven to be very
good. In both active and U-APSD mode it was possible to keep up 12
simultaneously calls on one single access point. Keep in mind that
the limitation was available handsets and not system capacity.
-
Interoperability Report - Ascom i62 / Zebra Technologies 7
2016-05-13
APPENDIX A: TEST CONFIGURATIONS
Zebra Technologies RFS4000 Controller and
AP6xx/65xx/71xx/75xx/8132 Access Points. In the following chapter
you will find screenshots and explanations of basic settings in
order to get the i62 operational with a Zebra Technologies. Please
note that security settings were modified according to requirements
in individual test cases. ESS, Radio and QoS settings
Wireless-Wireless LAN Basic Configuration.
-
Interoperability Report - Ascom i62 / Zebra Technologies 8
2016-05-13
Data rate configuration (2.4Ghz). Wireless-Wireless
LANs-Advanced- rates for 2.4Ghz WLANs
- The default data rate set will work just fine but to improve
the performance in the wireless system it is recommended to disable
the lowest data rates and disallow .11b client. This can be done by
selecting gn rates
Data rate configuration (5 Ghz). Wireless-Wireless
LANs-Advanced- rates for 5 Ghz WLANs
- Use the Default data rate set (an rates)
-
Interoperability Report - Ascom i62 / Zebra Technologies 9
2016-05-13
Radio Configuration
Radio configuration.
Radio configuration.
- Ascom recommends a Beacon Interval of 100ms and a DTIM
interval of 5. DTIM value 5 is recommended in order to allow
maximum battery conservation without impacting the quality. A lower
value will negatively impact the standby time.
- Make sure Dynamic Chain Selection is enabled. This feature
will compensate the power level between single stream client and
multi stream clients.
- Select the configured QoS profile
Note that both channel had Tx power have been manually set for
test purpose. Typical deployment use the Smart option.
-
Interoperability Report - Ascom i62 / Zebra Technologies 10
2016-05-13
General guidelines when deploying Ascom i62 handsets in
802.11a/n/ac environments:
1. Enabling more than 8 channels will degrade roaming
performance. Ascom recommends against going above this limit.
2. Using 40 MHz channels (or channel-bonding) will reduce the
number of non-DFS* channels to two in ETSI regions (Europe). In FCC
regions (North America), 40MHz is a more viable option because of
the availability of additional non-DFS channels. The handset can
co-exist with 40MHz stations in the same ESS.
3. Ascom do support and can coexist in 80MHz channel bonding
environments. The recommendations is however to avoid 80MHz channel
bonding as it severely reduces the number of available non
overlapping channels.
4. Make sure that all non-DFS channel are taken before resorting
to DFS channels. The handset can cope in mixed non-DFS and DFS
environments; however, due to unpredictability introduced by radar
detection protocols, voice quality may become distorted and roaming
delayed. Hence Ascom recommends if possible avoiding the use of DFS
channels in VoWIFI deployments.
*) Dynamic Frequency Selection (radar detection)
Wireless-WLAN QoS Policy.
- Make sure WMM is selected as Wireless Client Classification. -
Enable WMM Power Save.
Note. U-APSD is strongly recommended since it will boost the
battery performance dramatically.
-
Interoperability Report - Ascom i62 / Zebra Technologies 11
2016-05-13
Radio QoS Policy, CAC/TSPEC settings (Optional)
- Enable CAC/TSPEC by checking Enable Voice - Make sure Firewall
detection traffic Enable is disabled
Note. This step is optional and implies that TSPEC Call
admission control is intended to be used. Security settings
Security profile WPA2-PSK, AES-CCMP encryption. Step 1
-
Interoperability Report - Ascom i62 / Zebra Technologies 12
2016-05-13
Security profile WPA2-PSK, AES-CCMP encryption. Step 2.
Authentication type EAP step 1. Create a Radius policy under
Wireless/AAA Policy.
- Configure the IP Address to the Radius server - Type in the
secret that corresponds to the secret configured in the Radius
server.
Note that both a CA and a client certificate are needed for TLS.
Otherwise only a root certificate is needed. Server certificate
validation can be overridden in version 4.1.12 and above per
handset setting.
-
Interoperability Report - Ascom i62 / Zebra Technologies 13
2016-05-13
Authentication type EAP. Step 2.
- Select Authentication type EAP - Select the already previously
created AAA Policy.
Authentication type EAP step 3.
- Select preferred encryption type. WPA2-CCMP is recommended. -
Make sure both PMK caching and Opportunistic Key caching is
enabled. Without key caching a
full EAP exchange will be done every time the handset is roaming
and the performance will be degraded.
-
Interoperability Report - Ascom i62 / Zebra Technologies 14
2016-05-13
Configuration: Zebra Technologies WING configuration See
attached file (Run config.txt) for the RFS4000 configuration.
-
Interoperability Report - Ascom i62 / Zebra Technologies 15
2016-05-13
Ascom i62
Ascom i62 Network configurations (WPA2-PSK)
-
Interoperability Report - Ascom i62 / Zebra Technologies 16
2016-05-13
i62 network settings for 802.1X authentication
(PEAP-MSCHAPv2)
If 802.1X Authentication is used a CA certificate has to be
uploaded to the phone by right clicking - > Edit certificates.
EAP-TLS will require both a CA and a client certificate. Note that
both a root and a client certificate are needed for TLS. Otherwise
only a root certificate is needed. Server certificate validation
can be overridden in version 4.1.12 and above per handset setting
(Validate server certificate).
-
Interoperability Report - Ascom i62 / Zebra Technologies 17
2016-05-13
Innovaphone IP6000 (IP PBX) The Innovaphone IP6000 was
configured with a static IP address of 192.168.0.50. Signaling is
less relevant here since testing homes in on interoperability in
relation to the WLAN infrastructure and not features of the IP PBX.
IP6000 configuration: See attached file
(complete-IP6000-08-03-a6.txt) for configuration.
-
Interoperability Report - Ascom i62 / Zebra Technologies 18
2016-05-13
APPENDIX B: DETAILED TEST RECORDS VoWIFI Pass 18 Fail 0 Comments
1 Untested 2 Total 21 Results above is for 622 and 8132. See
attached file (WLANinteroperabilityTestReport_i62.xls) for detailed
test results. MISCELLANEOUS Please refer to the test specification
for WLAN systems on Ascoms interoperability web page for explicit
information regarding each test case. See URL (requires login):
https://www.ascom-ws.com/AscomPartnerWeb/en/startpage/Sales-tools/Interoperability
-
Interoperability Report - Ascom i62 / Zebra Technologies 19
2016-05-13
Document History Rev Date Author DescriptionPA 2012-12-16 SEKMO
Initial draft R1 2014-01-07 SEKMO Minor corrections. R1 state R2
2014-11-14 SEKMO Added AP 622 and 8132 v 5.5.5 R2a 2014-11-21 SEKMO
Minor corrections after review P3 2016-04-28 SEKMO Updated for
Zebra WiNG 5.8.3.0. First draft R3 2016-05-13 SEKMO Minor
corrections after review. Revision R3
i62
WLAN Interoperability Test ReportWLAN configuration:
Beacon Interval: 100ms
Test object - Handset:DTIM Interval: 5
Ascom i62 version 5.5.0802.11d Regulatory Domain: XX
Test object - WLAN system:WMM Enabled (Auto/WMM)
Zebra RFS4000 version 5.8.3.0No Auto-tune
AP 622, 650, 7522, 7532, 7131,
8132AP7522AP7532AP7131AP8132AP650AP622Single Voice VLAN
2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz2.4Ghz5.0Ghz
Test
CaseDescriptionVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictVerdictComment
TEST AREA ASSOCIATION / AUTHENTICATION
#101Association with open authentication, no
encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSHidden
broadcasted SSID ok
#107Association with WPA2-PSK authentication, AES-CCMP
encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS
#110Association with PEAP-MSCHAPv2 auth, AES-CCMP
encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFreeRADIUS;
RootCA loaded to Device.FAIL
#116Association with EAP-TLS
authenticationPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFreeRADIUS;
RootCA and client certificate loaded to Device.
TEST AREA POWER-SAVE AND QOSPASS
#150802.11 Power-save
modePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSFAIL
#151Beacon period and DTIM
intervalPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSDTIM 1,3 5
, Beacon Period 100tu.NOT TESTED
#152802.11e
U-APSDPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSSee
Comment
#202WMM
prioritizationPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSiperf
to create backgroung load. No degradation of voice quality.
#310CAC - TSPECSee CommentSee CommentSee CommentSee CommentSee
CommentSee CommentSee CommentSee CommentSee CommentSee CommentSee
CommentSee CommentGenerally OK. But no black list of rejected AP.
Myco roams back and sends data despite addts refused. No major
impact from user perspective
TEST AREA "PERFORMANCE"
#308Power-save mode U-APSD
WPA2-PSKPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS12hs ok
TEST AREA ROAMING AND HANDOVER TIMES
#401Handover with open authentication and no
encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS802.11an:
23ms 802.11gn: 29ms (No significant differnece beween AP
models)
#404Handover with WPA2-PSK auth and AES-CCMP
encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS802.11an:
47ms 802.11gn: 61ms (No significant differnece beween AP
models)
#408Handover with PEAP-MSCHAPv2 authentication and AES-CCMP
encryptionPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS802.11an:
36ms 802.11gn: 39ms (No significant differnece beween AP models),
OKC default neabled
#411Handover using PMKSA and opportunistic/proactive key
cachingPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPMKSA and
OKC always on - same testcase as #408
TEST AREA BATTERY LIFETIME
#501Battery lifetime in idlePASSPASSPASSPASSNOT TESTEDNOT
TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT
TESTED80-90h
#504Battery lifetime in call with power save mode
U-APSDPASSPASSPASSPASSNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT
TESTEDNOT TESTEDNOT TESTEDNOT TESTED12-14h
TEST AREA STABILITY
#602Duration of call U-APSD
modePASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS24h call
maintain without drop
TEST AREA 802.11n
#801Frame aggregation A-MSDUNOT TESTEDNOT TESTEDNOT TESTEDNOT
TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT TESTEDNOT
TESTEDNOT TESTEDNOT TESTED
#802Frame aggregation
A-MPDUPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSuplink and
downlink
#80440Mhz channelsNOT TESTEDPASSNOT TESTEDPASSNOT TESTEDPASSNOT
TESTEDPASSNOT TESTEDPASSNOT TESTEDPASS40Mhz channel width verified
only on 5GHz band
#805802.11n
ratesPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASSPASS
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2016.04.28 16:23:28
=~=~=~=~=~=~=~=~=~=~=~=
!! Configuration of RFS4000 version 5.8.3.0-041R!!version
2.5!!ip access-list BROADCAST-MULTICAST-CONTROL permit tcp any any
rule-precedence 10 permit udp any eq 67 any eq dhcpc
rule-precedence 11 deny udp any range 137 138 any range 137 138
rule-precedence 20 deny ip any 224.0.0.0/4 rule-precedence 21 deny
ip any host 255.255.255.255 rule-precedence 22 permit ip any any
rule-precedence 100 !mac access-list PERMIT-ARP-AND-IPv4 permit any
any type ip rule-precedence 10 permit any any type arp
rule-precedence 20 !ip snmp-access-list default permit
any!firewall-policy default--More-- no ip dos
tcp-sequence-past-window alg sip!!mint-policy
global-default!wlan-qos-policy default qos trust dscp qos trust
wmm!radio-qos-policy default no admission-control
firewall-detected-traffic no admission-control implicit-tspec
admission-control voice admission-control voice max-clients 3
admission-control voice max-airtime-percent 50!aaa-policy radius
authentication server 1 host 192.168.0.2 secret 0 secret
authentication server 1 proxy-mode through-controller!wlan
CompTest802 description IntopZebraPSK--More-- ssid IntopZebraPSK
vlan 1 bridging-mode tunnel encryption-type ccmp
authentication-type none no radio-resource-measurement
channel-report wpa-wpa2 psk 0 comptest use aaa-policy radius!wlan
CompTest80211MO description IntopZebra1X ssid IntopZebra1X vlan 1
bridging-mode tunnel encryption-type ccmp authentication-type eap
wpa-wpa2 psk 0 comptest wpa-wpa2 tkip-countermeasures hold-time 0
data-rates 2.4GHz gn use aaa-policy radius!wlan IntopZebraOPEN
description IntopZebraOPEN--More-- ssid IntopZebraOPEN vlan 1
bridging-mode tunnel encryption-type none authentication-type
none!smart-rf-policy "Intop RF policy"!!management-policy default
no telnet no http server https server ssh user admin password 1
cec2b32e59e52d3572e0a4ee5899e67131699047e6d03d8c94a35b99aa993edd
role superuser access all user operator password 1
d1e2a840b515d32594411c4bb00ee78c4fd485bc773bcdc802fc5e31181a60f9
role monitor access all snmp-server community 0 public ro
snmp-server user snmpoperator v3 encrypted des auth md5 0 operator
snmp-server user snmptrap v3 encrypted des auth md5 0 motorola
snmp-server user snmpmanager v3 encrypted des auth md5 0
motorola!--More-- ex3500-management-policy default snmp-server
community public ro snmp-server community private rw snmp-server
notify-filter 1 remote 127.0.0.1 snmp-server view defaultview 1
included!l2tpv3 policy default!profile rfs4000 default-rfs4000
autoinstall configuration autoinstall firmware crypto ikev1 policy
ikev1-default isakmp-proposal default encryption aes-256 group 2
hash sha crypto ikev2 policy ikev2-default isakmp-proposal default
encryption aes-256 group 2 hash sha crypto ipsec transform-set
default esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto
ikev2 remote-vpn crypto auto-ipsec-secure crypto remote-vpn-client
interface radio1 wlan CompTest80211MO bss 1 primary interface
radio2--More-- wlan CompTest80211MO bss 1 primary interface up1
interface ge1 interface ge2 interface ge3 interface ge4 interface
ge5 interface wwan1 interface pppoe1 use firewall-policy default
logging on service pm sys-restart router ospf router bgp!profile
ap81xx default-ap81xx no autoinstall configuration no autoinstall
firmware crypto ikev1 policy ikev1-default isakmp-proposal default
encryption aes-256 group 2 hash sha crypto ikev2 policy
ikev2-default isakmp-proposal default encryption aes-256 group 2
hash sha crypto ipsec transform-set default esp-aes-256
esp-sha-hmac--More-- crypto ikev1 remote-vpn crypto ikev2
remote-vpn crypto auto-ipsec-secure crypto remote-vpn-client
interface radio1 beacon dtim-period 5 wlan CompTest80211MO bss 1
primary wlan CompTest802 bss 2 primary wlan IntopZebraOPEN bss 3
primary interface radio2 beacon dtim-period 5 wlan CompTest80211MO
bss 1 primary wlan CompTest802 bss 2 primary wlan IntopZebraOPEN
bss 3 primary interface radio3 interface ge1 interface ge2
interface wwan1 interface pppoe1 use firewall-policy default
service pm sys-restart router ospf!--More-- profile ap7522
default-ap7522 no autoinstall configuration no autoinstall firmware
crypto ikev1 policy ikev1-default isakmp-proposal default
encryption aes-256 group 2 hash sha crypto ikev2 policy
ikev2-default isakmp-proposal default encryption aes-256 group 2
hash sha crypto ipsec transform-set default esp-aes-256
esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto
auto-ipsec-secure crypto load-management crypto remote-vpn-client
interface radio1 channel 6 power 8 beacon dtim-period 5 wlan
CompTest802 bss 1 primary wlan CompTest80211MO bss 2 primary wlan
IntopZebraOPEN bss 3 primary interface radio2 channel 36 power
8--More-- beacon dtim-period 5 wlan CompTest802 bss 1 primary wlan
CompTest80211MO bss 2 primary wlan IntopZebraOPEN bss 3 primary
interface ge1 interface pppoe1 use firewall-policy default service
pm sys-restart router ospf!profile ap7532 default-ap7532 no
autoinstall configuration no autoinstall firmware crypto ikev1
policy ikev1-default isakmp-proposal default encryption aes-256
group 2 hash sha crypto ikev2 policy ikev2-default isakmp-proposal
default encryption aes-256 group 2 hash sha crypto ipsec
transform-set default esp-aes-256 esp-sha-hmac crypto ikev1
remote-vpn crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto
load-management crypto remote-vpn-client--More-- interface radio1
channel 11 power 8 beacon dtim-period 5 wlan CompTest802 bss 1
primary wlan IntopZebraOPEN bss 2 primary wlan CompTest80211MO bss
3 primary interface radio2 channel 44 power 8 beacon dtim-period 5
wlan CompTest802 bss 1 primary wlan IntopZebraOPEN bss 2 primary
wlan CompTest80211MO bss 3 primary interface ge1 interface pppoe1
use firewall-policy default service pm sys-restart router
ospf!profile ap71xx default-ap71xx autoinstall configuration
autoinstall firmware--More-- crypto ikev1 policy ikev1-default
isakmp-proposal default encryption aes-256 group 2 hash sha crypto
ikev2 policy ikev2-default isakmp-proposal default encryption
aes-256 group 2 hash sha crypto ipsec transform-set default
esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2
remote-vpn crypto auto-ipsec-secure crypto remote-vpn-client
interface radio1 channel 1 power 8 beacon dtim-period 5 wlan
CompTest80211MO bss 1 primary wlan CompTest802 bss 2 primary wlan
IntopZebraOPEN bss 3 primary interface radio2 channel 149 power 8
beacon dtim-period 5 wlan CompTest80211MO bss 1 primary wlan
IntopZebraOPEN bss 2 primary wlan CompTest802 bss 3 primary--More--
interface radio3 interface ge1 interface ge2 interface vlan1 ip
address dhcp ip dhcp client request options all interface wwan1
interface pppoe1 use firewall-policy default logging on service pm
sys-restart!profile ap6532 default-ap6532 autoinstall configuration
autoinstall firmware crypto ikev1 policy ikev1-default
isakmp-proposal default encryption aes-256 group 2 hash sha crypto
ikev2 policy ikev2-default isakmp-proposal default encryption
aes-256 group 2 hash sha crypto ipsec transform-set default
esp-aes-256 esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2
remote-vpn crypto auto-ipsec-secure--More-- crypto load-management
crypto remote-vpn-client interface radio1 wlan CompTest80211MO bss
1 primary interface radio2 wlan CompTest80211MO bss 1 primary
interface ge1 interface vlan1 ip address dhcp ip dhcp client
request options all interface pppoe1 use firewall-policy default
logging on service pm sys-restart!profile ap650 default-ap650
autoinstall configuration autoinstall firmware crypto ikev1 policy
ikev1-default isakmp-proposal default encryption aes-256 group 2
hash sha crypto ikev2 policy ikev2-default isakmp-proposal default
encryption aes-256 group 2 hash sha crypto ipsec transform-set
default esp-aes-256 esp-sha-hmac--More-- crypto ikev1 remote-vpn
crypto ikev2 remote-vpn crypto auto-ipsec-secure crypto
load-management crypto remote-vpn-client interface radio1 beacon
dtim-period 5 wlan CompTest80211MO bss 1 primary wlan CompTest802
bss 2 primary interface radio2 beacon dtim-period 5 wlan
CompTest80211MO bss 1 primary wlan CompTest802 bss 2 primary
interface ge1 interface vlan1 ip address dhcp ip dhcp client
request options all interface pppoe1 use firewall-policy default
logging on service pm sys-restart!profile ap6511
default-ap6511--More-- autoinstall configuration autoinstall
firmware interface radio1 wlan CompTest80211MO bss 1 primary
interface up1 interface fe1 interface fe2 interface fe3 interface
fe4 interface vlan1 ip address dhcp ip address zeroconf secondary
ip dhcp client request options all interface pppoe1 use
firewall-policy default logging on service pm sys-restart!profile
ap622 default-ap622 no autoinstall configuration no autoinstall
firmware crypto ikev1 policy ikev1-default isakmp-proposal default
encryption aes-256 group 2 hash sha --More-- crypto ikev2 policy
ikev2-default isakmp-proposal default encryption aes-256 group 2
hash sha crypto ipsec transform-set default esp-aes-256
esp-sha-hmac crypto ikev1 remote-vpn crypto ikev2 remote-vpn crypto
auto-ipsec-secure crypto load-management crypto remote-vpn-client
interface radio1 data-rates gn beacon dtim-period 5 wlan
CompTest802 bss 1 primary wlan CompTest80211MO bss 2 primary wlan
IntopZebraOPEN bss 3 primary interface radio2 channel 44 power 8
beacon dtim-period 5 wlan CompTest80211MO bss 1 primary wlan
IntopZebraOPEN bss 2 primary wlan CompTest802 bss 3 primary
interface ge1 use firewall-policy default--More-- service pm
sys-restart!rf-domain default timezone Etc/GMT-5 country-code
us!rfs4000 5C-0E-8B-1A-F8-06 use profile default-rfs4000 use
rf-domain default hostname rfs4000-1AF806 license AP
DEFAULT-6AP-LICENSE license ADSEC DEFAULT-ADV-SEC-LICENSE ip
default-gateway 192.168.0.50 ip route 172.20.106.0/24 192.168.0.50
interface radio1 shutdown interface radio2 shutdown interface vlan1
description "Virtual Interface for LAN" ip address 192.168.0.17/24
ip address zeroconf secondary logging on--More-- logging console
warnings logging buffered warnings!ap81xx B4-C7-99-A0-96-C0 use
profile default-ap81xx use rf-domain default hostname ap8132-A096C0
autoinstall firmware device-upgrade auto interface radio1 channel 6
power 6 interface radio2 no shutdown channel 36 power 6!ap7522
84-24-8D-18-91-00 use profile default-ap7522 use rf-domain default
hostname ap7522-189100!ap7532 84-24-8D-1B-63-A8--More-- use profile
default-ap7532 use rf-domain default hostname ap7532-1B63A8
interface radio1 wlan CompTest80211MO bss 1 primary wlan
CompTest802 bss 2 primary wlan IntopZebraOPEN bss 3 primary
interface radio2 wlan CompTest80211MO bss 1 primary wlan
CompTest802 bss 2 primary wlan IntopZebraOPEN bss 3 primary!ap71xx
00-23-68-96-FF-AC use profile default-ap71xx use rf-domain default
hostname ap71xx-96FFAC interface radio1 no shutdown channel 1 power
6 interface radio2 channel 44 power 6--More-- !ap71xx
00-23-68-97-02-94 use profile default-ap71xx use rf-domain default
hostname ap71xx-970294 no autoinstall configuration no autoinstall
firmware autoinstall start-interval 1 interface radio1 channel 6
power 15 interface radio2 channel 40 power 15 no
configuration-persistence!ap650 5C-0E-8B-33-D9-70 use profile
default-ap650 use rf-domain default hostname ap650-33D970 interface
radio1 channel 6 power 8--More-- interface radio2 channel 36 power
8!ap650 5C-0E-8B-33-E1-AC use profile default-ap650 use rf-domain
default hostname ap650-33E1AC interface radio1 channel 1 power
smart interface radio2 channel 40 power 8!ap622 B4-C7-99-46-56-C8
use profile default-ap622 use rf-domain default hostname
ap622-4656C8 device-upgrade auto interface radio1 no shutdown
channel 1--More-- power 8 interface radio2 no shutdown channel 36w
power 8 wlan CompTest80211MO bss 1 primary wlan CompTest802 bss 2
primary wlan IntopZebraOPEN bss 3 primary!ap622 B4-C7-99-49-0F-24
use profile default-ap622 use rf-domain default hostname
ap622-490F24 interface radio1 no shutdown channel 6 power 8
interface radio2 no shutdown channel 40w power 8!!--More--
endrfs4000-1AF806>