Wireless access point WEP-3ax
User manual,
Firmware version 1.10.0 (10.2023)

IP address: http://192.168.1.10
User name: admin
Password: password



|| DeviceType | Wireless access point |
|| DeviceName | WEP-3ax 
|| DocTitleMain |  |
|| DocTitleAdditional | User manual |
|| fwversion | 1.10.0 |
|| issueDate | 10.2023 |
|| ipaddr | 192.168.1.10 |
|| username | admin |
|| password | password |



Introduction

Annotation

Modern tendencies of telecommunication development necessitate operators to search for the most optimal technologies, allowing to satisfy rapidly growing needs of subscribers, maintaining at the same time consistency of business processes, development flexibility and reduction of costs of various services provision. Wireless technologies are spinning up more and more and have paced a huge way for short time from unstable low-speed communication networks of low radius to broadband networks equitable to speed of wired networks with high criteria to the quality of provided services.

WEP-3ax are dedicated to be installed inside buildings as an access points and to create a seamless wireless network using several identical access points ("Roaming") on a large area.

This manual specifies intended purpose, main technical parameters, design, safe operation rules, installation and configuration recommendations for WEP-3ax.

Symbols

Notes and warnings

Notes contain important information, tips or recommendations on device operation and setup.


Warnings are used to inform the user about harmful situations for the device and the user alike, which could cause malfunction or data loss.

Device description

Purpose

The WEP-3ax wireless access points are designed to provide users with access to high-speed and safe network.

The devices are dedicated to create L2 wireless networks interfacing with a wired network. WEP-3ax is connected to a wired network via 100/1000/2500M Ethernet interface and arranges high-speed access to the Internet for devices supporting Wi-Fi technology at 2.4 and 5 GHz.

The devices have two radio interfaces to organize two physical wireless networks.

WEP-3ax supports up-to-date requirements to service quality and allow transmitting more important traffic in higher priorities queues. Prioritization is based on the main QoS technologies: CoS (Special tags in the VLAN packet field) and ToS (tags in the IP packet field).

Support for traffic shaping on each VAP allows to fully manage service quality and restrictions, both for all subscribers and for everyone in particular.

The devices are designed to be installed in offices, state buildings, conference halls, laboratories, hotels, etc. The creation of virtual access points with different types of encryption allows clients to delimit access rights among users and groups of users.

Device specification

Interfaces:

Functions:

WLAN capabilities:

Network functions:

QoS functions:

Security:

Support for WIDS/WIPS functionality is provided under the license.

Figure 1 shows WEP-3ax application diagram.

Figure 1 – WEP-3ax application diagram

Device technical parameters

Table 1 – Main Specifications

WAN Ethernet interface parameters

Number of ports

1

Electrical connector

RJ-45

Data rate

100/1000/2500 Mbps, auto-negotiation

Standards

BASE-T

Wireless interface parameters

Standards

802.11a/b/g/n/ac/ax

Frequency range

2400–2483.5 MHz; 5150–5350 MHz, 5470–5850 MHz

Modulation

BPSK, QPSK, 16QAM, 64QAM, 256QAM, 1024QAM

Operating channels

802.11b/g/n/ax: 1–13 (2402–2482 MHz)

802.11a/n/ac/ax:

  • 36–64 (5170–5330 MHz)
  • 100–144 (5490–5730 MHz)
  • 149–165 (5735–5835 MHz)

Speed of data transmission

2.4 GHz, 802.11ax: 574 Mbps
5 GHz, 802.11ax: 1201 Mbps

Maximum number of concurrent sessions2.4 GHz: 512
5 GHz: 512

Maximum transmitter power 

2.4 GHz: 22.5 dBm
5 GHz : 24 dBm

Antenna gain

2.4 GHz: ~ 3 dBi
5 GHz : ~ 3 dBi

Receiver sensitivity

2.4 GHz: up to -92 dBm
5 GHz: up to -93 dBm

Security

Centralized authorization via RADIUS server (802.1X WPA/WPA2/WPA3 Enterprise)
WPA/WPA2/WPA3 data encryption
Captive Portal
WIDS/WIPS1 support

Support for OFDMA and MU-MIMO 2×2

Control

Remote control

Web interface, Telnet, SSH, CLI, NETCONF, SoftWLC

Access restriction

By password

General parameters

Flash memory

256 MB NAND Flash

RAM

1 GB DDR4 RAM 

Power supply

PoE+ 48 V/56 V (IEEE 802.3at-2009)

Power consumption

No more than 13 W

Range of operation temperatures

From +5 to +40 °C

Relative humidity at 25 °C

Up to 80 %

Dimensions (Diameter x Height)

230 × 56 mm

Weight

0.56 kg

Lifetime

No less than 15 years 


WIDS/WIPS support is provided under the license. 

Radiation patterns

Radiation patterns for the embedded antennas are given below.

Radiation patterns for 2v1 and 2v2 board revisions are different.


WEP-3ax 2v1


2.4 GHz

5 GHz

WEP-3ax 2v2


2.4 GHz

5 GHz

Design

WEP-3ax is enclosed in a plastic case.

Device main panel

The main panel layout of the device is shown in Figure 2.


 

Figure 2 – Main panel of the device

The following light indicators, connectors and controls are located on the main panel of WEP-3ax (Table 2).

Table 2 – Description of indicators, ports and controls

Front panel element

Description

1

LAN

2.5GE (PoE) port status light indication

2

2.5GE (PoE)

2.5GE port for Ethernet cable and PoE+ power supply

3

F

Factory reset button

4

Wi-Fi

Status LEDs of Wi-Fi modules

Light indication

The current device state is displayed by Wi-Fi, LAN, Power indicators. The possible states of indicators are described in Table 3.

Table 3 – Light indication of device state

Indicator

Indicator status

Device state

Wi-Fi  

Solid green

Wi-Fi network is active

Flashing green

The process of data transmission trough a wireless network

LAN  

Solid green (100 Mbps)/

Solid orange (1000, 2500 Mbps)

The link with the connected network device is established

Flashing green

The process of packet data transmission through LAN interface

Power
(on the device top panel)

Solid green

The device is powered on, normal operation

Solid orange

The device is loaded but IP address is not received via DHCP

Solid red

The device is loading

Reset to the default configuration

The device can be reset to the factory configuration using the "F” button. Press and hold the "F" button until the "Power" indicator starts flashing. The device will automatically reboot. DHCP client will be launched by default. If the address is not obtained via DHCP, the device will have the default IP address — 192.168.1.10, and the following netmask — 255.255.255.0.

Delivery package

The delivery package includes:

Rules and recommendations for device installation

This section defines safety rules, installation recommendations, setup procedure and the device starting procedure.

Safety rules

  1. Do not install the device close to heat sources or at rooms with temperature below 5 °C or higher 40 °C.
  2. Do not use the device in places with high humidity. Do not expose the device to smoke, dust, water, mechanical vibrations or shocks.
  3. Do not open the device case. There are no user serviceable parts inside.

Do not cover ventilation holes and do not put other objects on the device in order to prevent overheating of device components.

Installation recommendations

  1. Recommended mounting position: horizontal, on the ceiling.
  2. Before installing the device and turning it on, check the device for visible mechanical defects. If defects are observed, stop the device installation, fill in the corresponding act and contact the supplier.
  3. If the device has been exposed to the cold for a long period of time, let it warm up at room temperature for two hours before starting work. If the device has been exposed to high humidity for a long period of time, let it stay under normal conditions for at least 12 hours before turning it on.
  4. During the device installation, follow these rules to ensure the best Wi-Fi coverage:
    1. Install the device at the center of a wireless network;
    2. Minimize the number of obstacles (walls, ceilings, furniture and etc.) between access point and other wireless network devices;
    3. Do not install the device near (about 2 m) electrical and radio devices;
    4. It is not recommended to use radiophone and other equipment operating at the frequency of 2.4 GHz, 5 GHz in Wi-Fi effective radius;
    5. Obstacles in the form of glass/metal constructions, brick/concrete walls, water cans and mirrors can significantly reduce Wi-Fi action radius. It is not recommended to place the device inside a false ceiling as metal frame causes multipath signal propagation and signal attenuation.
  5. When installing several access points, cell action radius should overlap with action radius of a neighboring cell at the level from -65 to -70 dBm. It is allowed to reduce the signal level to -75 dBm at cell boundaries, if it is not intended to use VoIP, video streaming and other sensitive to losses traffic in wireless network. 

Calculating the number of required access points

To calculate the required number of access points, evaluate the required coverage zone. For a more accurate assessment, it is necessary to make a radio examination of the room. Approximate coverage radius of confident reception of WEP-3ax access points when mounted on the ceiling in a typical office space: 2.4 GHz — 40–50 m, 5 GHz — 20–30 m. If there are no obstacles, the coverage area is up to 100 m for the 2.4 GHz band and up to 60 m for the 5 GHz band. 
Table 4 describes approximate attenuation values.

Table 4 – Attenuation values

Material  

Change of signal level, dB

2.4 GHz

5 GHz

Organic glass

-0.3

-0.9

Brick

-4.5

-14.6

Glass

-0.5

-1.7

Plaster slab

-0.5

-0.8

Wood laminated plastic

-1.6

-1.9

Plywood

-1.9

-1.8

Plaster with wirecloth

-14.8

-13.2

Breezeblock

-7

-11

Metal lattice

(mesh 13 × 6 mm, metal 2 mm)

-21

-13

Channel selection for neighboring access points

It is recommended to set non-overlapping channels to avoid interchannel interference among neighboring access points.


Figure 3 – General diagram of frequency channel overlap in the range of 2.4 GHz 

For the example of channel allocation scheme among neighboring access points in the 2.4 GHz band when channel width is 20 MHz, see Figure 4.


Figure 4 – Scheme of channel allocation among neighboring access points in the 2.4 GHz band when channel width is 20 MHz

Similarly, the procedure of channel allocation is recommended to save for access point allocation between floors, see Figure 5.


Figure 5 – Scheme of channel allocation between neighboring access points that are located between floors

With a channel width of 40 MHz there are no non-overlapping channels in the 2.4 GHz band. In such cases, it is required to select channels maximally separated from each other.



Figure 6 – Channels used in the 5 GHz band when channel width is 20, 40 or 80 MHz

Device installation

The device should be installed on the plain surface (wall, ceiling) in accordance with the safety instruction and recommendations listed above.
The device delivery package includes required mounting kit to attach the device to plain surface.

Wall mounting procedure

1. Fix the plastic bracket (included in the delivery package) to the wall. An example of placing the plastic bracket is shown in Figure 7.



Figure 7 – Attaching the bracket to a wall

2. Install the device. 

 

False ceiling mounting procedure 

It is not recommended to place the device inside of a false ceiling as metal frame causes multipath signal propagation and signal attenuation.



1 — metal bracket; 2 — Armstrong panel; 3 — plastic bracket; 4 — screws; 5 — device.

Figure 8 – Mounting on a false ceiling

1. Attach metal and plastic brackets to a ceiling as shown in Figure 8.

2. Install the device.

Removing the device from the bracket

To remove the device from the bracket:

  1. Pull the device up (Figure 7).
  2. Remove the device.

Device management via the web interface

Getting started

To get started, connect to the device via WAN interface using a web browser:

1. Open a web browser, for example, Firefox, Opera, Chrome.

2. Enter the device IP address in the browser address bar.

Factory IP address: 192.168.1.10, subnet mask: 255.255.255.0. By default, the device is capable to obtain an IP address via DHCP.

When the device is successfully detected, username and password request page will be shown in the browser window:

3. Enter username into "Login" and password into "Password" field.

Factory settings: login: admin, password: password.

4. Click "Log In". A menu for monitoring the status of the device will open in a browser window.

5. If necessary, select the information display language. Russian and English languages are available for web interface of WEP-3ax. 

Applying configuration and discarding changes

  1. Applying configuration 

Clicking  starts the process of saving the configuration to the device flash memory and applying the new settings. All the settings come into operation without device rebooting.

The WEP-3ax web interface has a visual indication of the current status of the setting applying process (Table 5). 

Table 5 – Visual indication of the current status of the setting application process

ImageState description

After clicking "Apply", the process of settings saving to device memory is launched. This is indicated by the  icon in the tab name and on the "Apply" button. 

The  icon in the tab name indicates about successful saving and application of the settings. 

2. Discarding changes

The changes can be discarded only before clicking “Apply”. If you click “Apply”, all the changed parameters will be applied and saved to the device memory. After clicking "Apply", return to the previous settings will not be possible.

The button for discarding changes appears as follows: .

Web interface basic elements

Navigation elements of the web interface are shown in the figure below.

User interface window is divided into five general areas:

  1. Menu tabs categorize the submenu tabs: Monitoring, Radio, VAP, WDS, Network Settings, External Services, System.
  2. Interface language selection and Logout button designed to end a session in the web interface under a given user.
  3. Submenu tabs allow one to control settings field.
  4. Device configuration field displays data and configuration.
  5. Information field displays the firmware and web interface versions.

"Monitoring" menu

In the "Monitoring" menu, the current system state can be viewed.

"Wi-Fi Clients" submenu

The "Wi-Fi clients" submenu displays information about the status of connected Wi-Fi clients.


To display more detailed information on a particular client, select it from the list. A detailed description includes the following options: 

"Traffic Statistics" submenu

The “Traffic Statistics” section displays the graphs of the transmitted/received traffic speed for the last 3 minutes, as well as statistics on the amount of transmitted/received traffic since the access point was turned on. 

The WLAN0 and WLAN1 Tx/Rx graphs show the rate of transmitted/received traffic via Radio 2.4 GHz (WLAN0) and Radio 5 GHz (WLAN1) interfaces for the last 3 minutes. The gragh is automatically updated every 2 seconds.

The LAN Tx/Rx graph shows the speed of the transmitted/received traffic via Ethernet interface of the access point for the last 3 minutes. The graph is automatically updated every 2 seconds.  

"Transmit" table description:

"Receive" table description:

"Scan Environment" submenu

The "Scan Environment" submenu allows scanning the surrounding radio to detect neighboring access points.

Click "Scan" to start the environment scanning process. When the process is completed, the page will display a list of detected access points and information about them:

Please note that while scanning the environment, the device radio interface will be disabled, which will make it impossible to transfer data to Wi-Fi clients during scanning.

"Spectrum Analyzer" submenu

In the "Spectrum Analyzer" submenu, the spectrum analyzer is started and monitored.

The WEP-3ax devices have the ability to run a spectrum analyzer on the 2.4 GHz and 5 GHz radio interfaces.

Running the spectrum analyzer on radio interfaces

Note that running the spectrum analyzer on the radio interface (Radio 2.4 GHz or Radio 5 GHz) will put it into scanning mode, which will disable all Wi-Fi clients connected to that radio interface.

Click "Scan" to start the spectrum analyzer. The information window to the right of the button displays the time in seconds that has elapsed since the start of scanning. The time of the spectrum analyzer on the Radio 2.4 GHz radio interface does not exceed 26 seconds, on the Radio 5 GHz does not exceed 34 seconds.  

The spectrum analyzer on the radio interface operates only on channels that are reflected in the "Channels List" parameter. For example, if the Radio 2.4 GHz channel list contains channels '1 6 11', the spectrum analysis will only be performed for channels 1, 6 and 11. To add/remove channels from this list, go to the tab corresponding to this radio interface on the "Radio" page and make changes in the "Use Limit Channels" parameter.

In order to analyze all the channels of the band on which the radio interface operates, go to the tab corresponding to the radio interface on the "Radio" page and uncheck the option "Use Limit Channels". After receiving the results of the spectrum analyzer, check the "Use Limit Channels" option again.

For more information about configuring the radio interface via web interface, see the "Radio" menu section.

"Events" submenu

The “Events” submenu provides a list of events occurring on the device in real time. The event log contains the following information:

Table 6 – Description of event severity levels

Level

Message severity level

Description

0

Emergency

A critical error has occurred in the system, the system may not work properly.

1

Alert

Immediate intervention is required.

2

Critical

A critical error has occurred in the system.

3

Error

An error has occurred in the system.

4

Warning

Warning, non-emergency message.

5

Notice

System notice, non-emergency message.

6

Informational

Informational system messages.

7

Debug

Debugging messages provide the user with information to correctly configure the system.

To receive new messages in the event log, click "Refresh".

If necessary, all old messages can be deleted from the log by clicking “Clear”.

"Network Information" submenu

In the "Network Information" submenu, general network settings of the device can be viewed. 

WAN Status:

Ethernet:

ARP:
The ARP table contains mapping information between the IP and MAC addresses of neighboring network devices:

Routes:

"Radio Information" submenu

The "Radio Information" submenu displays the current status of WEP-3ax radio interfaces. 

Radio interfaces of an access point may be in two states: "On" and "Off". The status of each of the radio interfaces is reflected in the "Status" parameter.
Radio status depends on whether a given radio interface has virtual access points (VAP) enabled. If there is at least one active VAP on the radio interface, Radio will be in the "On" status, otherwise it will be in "Off" status.

Depending on Radio status, the following information is available for monitoring:

"Off":

"On":

"Device Information" submenu

The "Device Information" submenu displays main WEP-3ax parameters. 

"Radio" menu

In the "Radio" menu, the wireless interface can be configured.

"Radio 2.4 GHz" submenu

In the "Radio 2.4 GHz" submenu, the main parameters of the radio interface of the device operating in the 2.4 GHz band can be configured. 


If the "Use Limit channels" list contains a channel that is not available for selection, it will be marked in grey. In order for the new configuration to be applied to an access point, only available (blue highlighted) channels should be specified in the "Use Limit channels" list.

Example. No settings have been made on the access point yet, Radio 2.4 GHz is set to 20 MHz "Channel Bandwidth" by default, and channels are specified in the "Use Limit Channels" list: 1, 6, 11.
Suppose the parameter "Channel Bandwidth" is set to 40 MHz. When you change this parameter from 20 MHz to 40 MHz, the following happens:

  • The "Primary Channel" parameter becomes available for editing and the default value is "Lower",
  • Channel 11 in the "Use Limit Channels" list changes its color from blue to grey.

If to change the "Channel Bandwidth" parameter to 40 MHz and do not remove the "grey" channels from the list, then when you click "Apply" in the browser an error will appear – "There are errors in data. Changes were not applied". Accordingly, the access point configuration will not be changed. This is due to the fact that channels in the "Use Limit Channels" list that are highlighted in grey do not fit the definition "Primary channel" = Lower.

In the "Advanced" section, the advanced radio interface parameters of the device can be configured.

"Radio 5 GHz" submenu

In the "Radio 5 GHz" submenu, the main parameters of the radio interface of the device operating in the 5 GHz band can be configured. 

If the "Use Limit channels" list contains a channel that is not available for selection, it will be marked in grey. In order for the new configuration to be applied to an access point, only available (blue highlighted) channels must be specified in the "Use Limit channels" list.

Example. No settings have been made on the access point yet, Radio 5 GHz is set to 20 MHz "Channel Bandwidth" by default, and channels are specified in the "Use Limit Channels" list: 36, 40, 44, 48.
Suppose the parameter "Channel Bandwidth" is set to 40 MHz. When you change this parameter from 20 MHz to 40 MHz, the following happens:

  • The "Primary Channel" becomes available for editing and the default value is "Lower",
  • Channels 40 and 48 in the "Use Limit Channels" list change their color from blue to grey.

If you change the "Channel Bandwidth" parameter to 40 MHz and do not remove the "grey" channels from the list, then when you click "Apply" in the browser an error will appear – "There are errors in data. Changes was not applied". Accordingly, the access point configuration will not be changed. This is due to the fact that channels in the "Use Limit Channels" list that are highlighted in grey do not fit the definition "Primary channel" = Lower.

In the "Advanced" section, the advanced radio interface parameters of the device can be configured.

"Advanced" submenu

In the "Advanced" submenu, the advanced device radio interface parameters can be configured.

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"VAP" menu

In the "VAP" menu, virtual Wi-Fi access points (VAPs) can be configured. 

"Summary" submenu

The "Summary" submenu displays the settings of all VAPs on the Radio 2.4 GHz and the Radio 5 GHz radio interfaces.

Only the first four VAPs of each radio interface are displayed on the page by default. To see a full list of available VAPs, click "Show all". Click "Minimize" to return the display of VAPs number in the list to its original state.

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"VAP" submenu

Common Settings


RADIUS Server

ACL

MAC address authentification.

Captive Portal

For such security modes as Off, WPA, WPA2, WPA/WPA2, WPA3, WPA2/WPA3 captive portal setting is available on the VAP.

RADIUS

Shapers

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"WDS" menu

In the “WDS” menu, wireless bridges between WEP-3ax are configured.

When configuring a WDS connection, it is necessary to select the same channel and channel width in the radio interface settings on the the devices that will be connected via WDS. Auto-channel should be disabled and the DFS option should be set to "off" or "forced".
More detailed information about configuring the radio interface via the command line can be found in the Radio Settings section.


When configuring a WDS connection on the Radio 2.4 GHz/Radio 5 GHz it is necessary to enable VAP0 on the Radio 2.4 GHz/Radio 5 GHz. The encryption modes on VAP and WDS interfaces should be the same. 

More detailed information about configuring VAPs can be found in the Virtual Wi-Fi access points (VAPs) configuration section. 

"WDS" submenu

In the "2.4 GHz" and "5 GHz" tabs of the "WDS" submenu, select the radio interface of the device on which a wireless bridge should be built. 

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"Network settings" menu

"System Configuration" submenu

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"Access" submenu

In the "Access" submenu, access to the device via the web interface, Telnet, SSH, NETCONF and SNMP can be configured.

To change the parameters of the access point SNMP agent, it is necessary to check the "SNMP" box and click the "SNMP", a list of parameters available for editing will appear:

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"External Services" menu

"Captive Portal" submenu

The "Captive Portal" submenu is designed to enable and configure the APB service at the access point.

The APB service is used to provide portal roaming of clients between access points connected to the service.

To apply a new configuration and save setting to non-volatile memory, click "Apply". Click "Cancel" to discard the changes.

"System" menu

In the "System" menu, the user can configure system, time, device access via different protocols, change password and update device firmware.

"Device Firmware Upgrade" submenu

The "Device Firmware Upgrade" submenu is intended for upgrading the device firmware.

Firmware upgrading

Download the firmware file from http://eltex-co.com/support/downloads/ and save it on your computer. To do this, click "Choose Filein the Firmware Image field and specify the path to the firmware file in .tar.gz format.
To start the update process, click "Start Upgrading". The process may take several minutes (its current status will be shown on the page). The device will automatically reboot when the upgrade is completed.

Do not switch off or reboot the device during the firmware upgrade.

"Configuration" submenu

In the "Configuration" submenu, the current configuration can be saved and updated.

Backup Configuration

To save current device configuration to local computer click "Download".

Restore Configuration

To download the configuration file saved on the local computer, use the Restore Configuration item. To update the device configuration, click "Choose File" and specify a file (in .tar.gz format) and click "Upload File". Uploaded configuration will be applied automatically and does not require device reboot. 

Reset to Default Configuration

To reset all the settings to default values, click "Reset". If the "Save access setting" box is checked, then those settings that are responsible for access to the device (IP address settings, Telnet/SSH/SNMP/Netconf/web access settings) will be saved.

"Reboot" submenu

To reboot the device, click "Reboot". The device reboot process takes about 1 minute.

"Password" submenu

When logging in via web interface, administrator (default password: password) has the full access to the device: read/write any settings, full device status monitoring.
To change the password, enter the new password first in the "Password" field, then repeat this password in the "Confirm Password" field and click "Apply" to save the configuration.

"Log" submenu

The "Log" submenu is intended to configure the output of various kinds of system debugging messages in order to detect the causes of problems in the device operation. 

"Date and Time" submenu

In the "Date and Time" submenu, the time can be set up manually or using the time synchronization protocol (NTP).

Manual


NTP Server


To apply a new configuration and store settings into the non-volatile memory, click "Apply". To discard changes click "Cancel"

Device management via the command line

To display the existing settings of a particular configuration section, enter the show-config command.

Press the key combination (English layout) – [Shift + ? ] to get a hint of what value this or that configuration parameter can take.

To get a list of options available for editing in this configuration section, press the Tab key.

To save the settings, enter the save command.

To go back to the previous configuration section, enter the exit command.

Connection to the device

By default, WEP-3ax is configured to receive the address via DHCP. If this does not happen, it is possible to connect to the device using the factory IP address.

The default IP-address of WEP-3ax: 192.168.1.10, subnet mask: 255.255.255.0

Connection to the device is performed via SSH/Telnet:

ssh admin@<IP address of the device>, then enter the password

telnet <IP address of the device>, enter login and password

Network parameters configuration

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface#
br0
WEP-3ax(config):/interface/br0#
common
WEP-3ax(config):/interface/br0/common#
static-ip X.X.X.X (where X.X.X.X – WEP-3ax IP address)
WEP-3ax(config):/interface/br0/common#
netmask X.X.X.X (where X.X.X.X – subnet mask)
WEP-3ax(config):/interface/br0/common# dns-server-1 X.X.X.X (where X.X.X.X – IP address of the dns server #1)
WEP-3ax(config):/interface/br0/common# dns-server-2 X.X.X.X (where X.X.X.X – IP address of the dns server #2)
WEP-3ax(config):/interface/br0/common#
protocol static-ip (change operation mode from DHCP to Static-IP)
WEP-3ax(config):/interface/br0/common#
save (save configuration)


Adding a static route

WEP-3ax(config):/interface/br0/common# exit
WEP-3ax(config):/interface/br0# exit
WEP-3ax(config):/interface# exit
WEP-3ax(config):/# route
WEP-3ax(config):/route# add default (where default – route name)
WEP-3ax(config):/route# default
WEP-3ax(config):/route/default# destination X.X.X.X (where X.X.X.X – destination host or network IP address, for the default route – 0.0.0.0)
WEP-3ax(config):/route/default# netmask X.X.X.X (where X.X.X.X – destination network mask, for the default route – 0.0.0.0)
WEP-3ax(config):/route/default# gateway X.X.X.X (where X.X.X.X – gateway IP address)
WEP-3ax(config):/route/default# save (save configuration)


WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# br0
WEP-3ax(config):/interface/br0# common
WEP-3ax(config):/interface/br0/common# protocol dhcp 
WEP-3ax(config):/interface/br0/common# save (save configuration)

Network parameters configuration using the set-management-vlan-mode utility

Obtain network settings via DHCP:

WEP-3ax(root):/# set-management-vlan-mode off protocol dhcp

Static settings:

WEP-3ax(root):/# set-management-vlan-mode off protocol static-ip ip-addr X.X.X.X netmask Y.Y.Y.Y gateway Z.Z.Z.Z (where X.X.X.X – static IP address, Y.Y.Y.Y – subnet mask, Z.Z.Z.Z – gateway)


Obtain network settings via DHCP:

WEP-3ax(root):/# set-management-vlan-mode terminating vlan-id X protocol dhcp (where X – VLAN ID used for device access. Possible values: 1–4094)

Static settings:

WEP-3ax(root):/# set-management-vlan-mode terminating vlan-id X protocol static-ip ip-addr X.X.X.X netmask Y.Y.Y.Y gateway Z.Z.Z.Z (where X – VLAN ID used for device access. Possible values: 1–4094, X.X.X.X – static IP address; Y.Y.Y.Y – subnet mask; Z.Z.Z.Z – gateway)


Obtain network settings via DHCP:

WEP-3ax(root):/# set-management-vlan-mode forwarding vlan-id X protocol dhcp (where X – VLAN ID used for device access. Possible values: 1–4094)

Static settings:

WEP-3ax(root):/# set-management-vlan-mode forwarding vlan-id X protocol static-ip ip-addr X.X.X.X netmask Y.Y.Y.Y gateway Z.Z.Z.Z (where X – VLAN ID used for device access. Possible values: 1–4094, X.X.X.X – static IP address; Y.Y.Y.Y – subnet mask; Z.Z.Z.Z – gateway)


WEP-3ax(root):/#  save (save configuration)

Virtual Wi-Fi access points (VAPs) configuration

When configuring a VAP, remember that the interface names in the 2.4 GHz range start with wlan0, in the 5 GHz range with wlan1.

Table 7 – Commands for configuring security mode on VAP

Security mode

Command to set the security mode

Without password

mode off

WPA

mode WPA

WPA2

mode WPA2

WPA/WPA2

mode WPA_WPA2

WPA3

mode WPA3

WPA2/WPA3mode WPA2_WPA3

WPA-Enterprise

mode WPA_1X

WPA2-Enterprise

mode WPA2_1X

WPA/WPA2-Enterprise

mode WPA_WPA2_1X

WPA3-Enterprisemode WPA3_1X
WPA2/WPA3-Enterprisemode WPA2_WPA3_1X

Below are examples of VAP configuration with different security modes for Radio 5 GHz (wlan1).

Configuration of VAP without encryption

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-vap0
WEP-3ax(config):/interface/wlan1-vap0# common
WEP-3ax(config):/interface/wlan1-vap0/common# enabled true (enable virtual access point)
WEP-3ax(config):/interface/wlan1-vap0/common# exit
WEP-3ax(config):/interface/wlan1-vap0# vap
WEP-3ax(config):/interface/wlan1-vap0/vap# ssid 'SSID_WEP-3ax_open' (change SSID name)
WEP-3ax(config):/interface/wlan1-vap0/vap# ap-security (go to the security settings block on the VAP) 
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# mode off (encryption mode off – without password)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# save (save configuration)

Configuration of VAP with WPA-Personal security mode

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-vap0
WEP-3ax(config):/interface/wlan1-vap0# common
WEP-3ax(config):/interface/wlan1-vap0/common# enabled true (enable virtual access point)
WEP-3ax(config):/interface/wlan1-vap0/common# exit
WEP-3ax(config):/interface/wlan1-vap0# vap
WEP-3ax(config):/interface/wlan1-vap0/vap# ssid 'SSID_WEP-3ax_Wpa2' (change SSID name)
WEP-3ax(config):/interface/wlan1-vap0/vap# ap-security (go to the security settings block on the VAP)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# mode WPA2_WPA3 (encryption mode – WPA2/WPA3)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# key-wpa password123 (where password123 – key/password required to connect to the virtual access point. The length of the key should be between 8 and 63 characters)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# save (save configuration)

Configuration of VAP with Enterprise authorization

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-vap0
WEP-3ax(config):/interface/wlan1-vap0# common
WEP-3ax(config):/interface/wlan1-vap0/common# enabled true (enable virtual acess point)
WEP-3ax(config):/interface/wlan1-vap0/common# exit
WEP-3ax(config):/interface/wlan1-vap0# vap
WEP-3ax(config):/interface/wlan1-vap0/vap# ssid 'SSID_WEP-3ax_enterprise' (change SSID name)
WEP-3ax(config):/interface/wlan1-vap0/vap# ap-security (go to the security settings block on the VAP)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# mode WPA2_WPA3_1X (encryption mode – WPA2/WPA3-Enterprise)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# radius
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# domain root (where root – user domain)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# auth-address X.X.X.X (where X.X.X.X – IP address of RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# auth-port X (where X – RADIUS server port used for authentication and authorization. Default: 1812)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# auth-password secret (where secret – RADIUS server password used for authentication and authorization)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-enable true (enable sending of "Accounting" messages to the RADIUS server. Default: false)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-address X.X.X.X (where X.X.X.X – IP address of the RADIUS server used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-password secret (where secret – password of the RADIUS server used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-periodic true (enable a periodic sending of "Accounting" messages to the RADIUS server. Default: false)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-interval 600 (interval of sending "Accounting" messages to the RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# save (save configuration)

Configuration of VAP with Captive Portal

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-vap0  
WEP-3ax(config):/interface/wlan1-vap0# common
WEP-3ax(config):/interface/wlan1-vap0/common# enabled true 
WEP-3ax(config):/interface/wlan1-vap0/common# exit
WEP-3ax(config):/interface/wlan1-vap0# vap
WEP-3ax(config):/interface/wlan1-vap0/vap# vlan-id X (where X – VLAN-ID on VAP)
WEP-3ax(config):/interface/wlan1-vap0/vap# ap-security (go to the security settings block on the VAP)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# mode off (encryption mode off – without password)
WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# exit 
WEP-3ax(config):/interface/wlan1-vap0/vap# ssid 'Portal_WEP-3ax' (change SSID name)
WEP-3ax(config):/interface/wlan1-vap0/vap# captive-portal
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal# scenarios
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal/scenarios# scenario-redirect
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal/scenarios/scenario-redirect# redirect-url  http://<IP>:<PORT>/eltex_portal/ (specify virtual portal URL)
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal/scenarios/scenario-redirect# virtual-portal-name default (specify portal name. Default: default)
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal/scenarios/scenario-redirect# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal/scenarios# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal# enabled true 
WEP-3ax(config):/interface/wlan1-vap0/vap/captive-portal# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# radius
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# domain root (where root – user domain)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-enable true (enable the sending of "Accounting" messages to the RADIUS server. Default: false)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-address X.X.X.X (where X.X.X.X – IP address of the RADIUS server used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-password secret (where secret – password for RADIUS server used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-periodic true (enable a periodic sending of "Accounting" messages to the RADIUS server. Default: false)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-interval 600 (interval of sending "Accounting" messages to the RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# save (save configuration)

Configuration of VAP with RADIUS MAC authorization

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-vap0
WEP-3ax(config):/interface/wlan1-vap0# vap
WEP-3ax(config):/interface/wlan1-vap0/vap# acl
WEP-3ax(config):/interface/wlan1-vap0/vap/acl# mode radius (select an authorization mode via RADIUS server. Default: off)
WEP-3ax(config):/interface/wlan1-vap0/vap/acl# policy allow (allow: access is allowed to those approved by the RADIUS server; deny: access is denied to those approved by the RADIUS server. Default: allow)
WEP-3ax(config):/interface/wlan1-vap0/vap/acl# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# radius
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# domain root (where root – user domain)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# auth-address X.X.X.X (where X.X.X.X – IP address of RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# auth-port X (where Х – port of RADIUS server, used for authentication and authorization. Default: 1812)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# auth-password secret (where secret – password for RADIUS server, used for authentication and authorization)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-enable true (enable sending of “Accounting” messages to the RADIUS server. Default: false)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-address X.X.X.X (where X.X.X.X – IP address of RADIUS server, used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-password secret (where secret – password for RADIUS server, used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-periodic true (enable a periodic sending of "Accounting" messages to the RADIUS server. Default: false)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# acct-interval 600 (interval of sending "Accounting" messages to the RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# save (save configuration)

Configuration of backup RADIUS server on VAP

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-vap0
WEP-3ax(config):/interface/wlan1-vap0# vap
WEP-3ax(config):/interface/wlan1-vap0/vap# radius (configuring primary RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius# backup (configuring a backup RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup# add <Domain name/IP address of backup RADIUS server in the configuration> (creating a configuration section for a backup RADIUS server. Maximum number: 4)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup# X.X.X.X (where X.X.X.X – domain name/IP address of a backup RADIUS server in the configuration)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# auth-address X.X.X.X (where X.X.X.X – IP address of RADIUS server)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# auth-port X (where Х – port of RADIUS server, used for authentication and authorization. Default: 1812)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# auth-password secret (where secret – password for RADIUS server, used for authentication and authorization)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# acct-address X.X.X.X (where X.X.X.X – IP address of RADIUS server, used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# acct-port X (where Х – port of RADIUS server, used for accounting. Default: 1813)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# acct-password secret (where secret – password for RADIUS server, used for accounting)
WEP-3ax(config):/interface/wlan1-vap0/vap/radius/backup/X.X.X.X# save (save configuration)

Advanced VAP settings

WEP-3ax(config):/interface/wlan1-vap0/vap# vlan-id X (where X – VLAN-ID number on VAP) 


WEP-3ax(config):/interface/wlan1-vap0/vap# vlan-trunk true (enable VLAN Trunk on VAP. To disable, enter false)


WEP-3ax(config):/interface/wlan1-vap0/vap# general-vlan-mode true (enable General VLAN on SSID. To disable, enter false)
WEP-3ax(config):/interface/wlan1-vap0/vap# general-vlan-id X (where X – General VLAN number)


WEP-3ax(config):/interface/wlan1-vap0/vap# priority-by-dscp false (priority analysis from CoS field (Class of Service) of the tagged packets. Value by default: true. In this case, the priority from DSCP header field of the IP packet is analyzed)


WEP-3ax(config):/interface/wlan1-vap0/vap/ap-security# mfp required (enable management frame protection. required — MFP support is required from the client, clients without MFP will not be able to connect. capable — compatible with MFP, clients without MFP support can connect. To disable, enter off)


WEP-3ax(config):/interface/wlan1-vap0/vap# hidden true (enable hidden SSID. To disable, enter false)


WEP-3ax(config):/interface/wlan1-vap0/vap# band-steer-mode true (enable Band Steer mode. To disable, enter false)


WEP-3ax(config):/interface/wlan1-vap0/vap# station-isolation true (enable traffic isolation between clients within a single VAP. To disable, enter false)


WEP-3ax(config):/interface/wlan1-vap0/vap# check-signal-enable true (enable the use of Minimal Signal functionality. To disable, enter false)
WEP-3ax(config):/interface/wlan1-vap0/vap# min-signal -X (where X – RSSI threshold value, when reached, the point will disconnect the client from the VAP. The parameter can take values from -100 to -1)
WEP-3ax(config):/interface/wlan1-vap0/vap# check-signal-timeout X (where X – time period in seconds, after which the decision is made to disconnect the client equipment from the virtual network)
WEP-3ax(config):/interface/wlan1-vap0/vap# roaming-signal -X  (where X – RSSI threshold value, when reached, the client equipment is switched to another access point. The parameter can take values from -100 to -1 The roaming-signal parameter should be lower than min-signal: if min-signal = -75 dBm, then roaming-signal should be equal to -70 dBm, for example)
WEP-3ax(config):/interface/wlan1-vap0/vap# save (save configuration)


Configuring the shaper in the direction from the clients (each individually) connected to this VAP to the AP:

WEP-3ax(config):/interface/wlan1-vap0/vap# shaper-per-sta-rx 
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-sta-rx# value X (where X – maximum rate in Kbps)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-sta-rx# mode kbps (enable shaper. To disable, enter off)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-sta-rx# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# save (save configuration)


Configuring the shaper in the direction from the AP to the clients (each individually) connected to this VAP:

WEP-3ax(config):/interface/wlan1-vap0/vap# shaper-per-sta-tx
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-sta-tx# value X (where X – maximum rate in Kbps)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-sta-tx# mode kbps (enable shaper. To disable, enter off)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-sta-tx# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# save (save configuration)


Configuring the shaper in the direction from the clients (all) connected to this VAP to the AP:

WEP-3ax(config):/interface/wlan1-vap0/vap# shaper-per-vap-rx
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-vap-rx# value X (where X – maximum rate in Kbps)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-vap-rx# mode kbps (enable shaper. To disable, enter off)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-vap-rx# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# save (save configuration)


Configuring the shaper in the direction from the AP to the clients (all) connected to this VAP:

WEP-3ax(config):/interface/wlan1-vap0/vap# shaper-per-vap-tx
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-vap-tx# value X (where X – maximum rate in Kbps)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-vap-tx# mode kbps (enable shaper. To disable, enter off)
WEP-3ax(config):/interface/wlan1-vap0/vap/shaper-per-vap-tx# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# save (save configuration)

802.11r configuration

This type of roaming is only available for client devices that support 802.11r.

802.11r roaming is only possible between VAPs with security modes: WPA2 Personal and WPA2 Enterprise.
For instructions on configuring a VAP with different security modes, see section Configuration of VAP with WPA-Personal security mode.

Each VAP on access points should be configured individually, such as AP1(wlan1)↔AP2(wlan1), AP1(wlan0)↔AP2(wlan0), AP1(wlan1)↔AP3(wlan1), etc.

Below is an example of how to configure 802.11r on two access points: AP1 and AP2.

WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# enabled false
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# r1-key-holder-id E8:28:C1:FC:D6:80 (VAP MAC address. Displayed in the ifconfig command output)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# r0-key-holder-id 12345 (unique key for the given VAP, for example, a serial number)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# mobility-domain 100 (the domain should be the same on the remote VAPs)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# mac
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac# add E4:5A:D4:E2:C4:B0 (MAC address of VAP interface on the remote access point – AP2. Maximum number: 256)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac# E4:5A:D4:E2:C4:B0
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E4:5A:D4:E2:C4:B0# r0-kh-id 23456 (unique key of the remote VAP on AP2 – r0-key-holder-id)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E4:5A:D4:E2:C4:B0# r1-kh-id E4:5A:D4:E2:C4:B0 (MAC address of the remote VAP on AP2)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E4:5A:D4:E2:C4:B0# r0-kh-key 0102030405060708 (random key. It should not match r1-kh-key of AP1, but it should match r1-kh-key of the remote AP2)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E4:5A:D4:E2:C4:B0# r1-kh-key 0001020304050607 (random key. It should match r0-kh-key of AP1, but it should match r0-kh-key of the remote AP2)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E4:5A:D4:E2:C4:B0# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# enabled true (enable access point operation using the 802.11r protocol)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# save (save configuration)


WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# enabled false
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# r1-key-holder-id E4:5A:D4:E2:C4:B0 (VAP MAC address. Displayed in the ifconfig command output)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# r0-key-holder-id 23456 (unique key for the given VAP, for example, a serial number)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# mobility-domain 100 (the domain should be the same on the remote VAPs)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# mac
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac# add E8:28:C1:FC:D6:80 (MAC address of VAP interface on the remote access point – AP1)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac# E8:28:C1:FC:D6:80
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E8:28:C1:FC:D6:80# r0-kh-id 12345 (unique key for the remote VAP on the AP1 access point – r0-key-holder-id)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E8:28:C1:FC:D6:80# r1-kh-id E8:28:C1:FC:D6:80 (MAC address of the remote VAP of AP1)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E8:28:C1:FC:D6:80# r0-kh-key 0001020304050607 (random key. It should not match r1-kh-key of AP2, but it should match r1-kh-key of the remote AP1)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E8:28:C1:FC:D6:80# r1-kh-key 0102030405060708 (random key. It should not match r0-kh-key of AP2, but it should match r0-kh-key of the remote AP1)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac/E8:28:C1:FC:D6:80# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config/mac# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# enabled true (enable access point operation using the 802.11r protocol)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# save (save configuration)

802.11r configuration via AirTune

The feature is supported starting from WEP-3ax firmware version 1.6.0, AirTune version 1.4.0.

For 802.11r auto-configuration on the access point via AirTune enable 802.11r functionality and interaction with the AirTune. 
Below is an example of how to configure 802.11r via AirTune. 

WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# enabled true (enable access point operation using the 802.11r protocol)
WEP-3ax(config):/interface/wlan1-vap0/vap/ft-config# exit
WEP-3ax(config):/interface/wlan1-vap0/vap# exit
WEP-3ax(config):/interface# exit
WEP-3ax(config):/#
 airtune
WEP-3ax(config):/airtune# airtune_service_url ws://192.168.1.20:8099/apb/rrm (where 192.168.1.20 is an IP address of a server, on which the AirTune is installed)
WEP-3ax(config):/airtune# enabled true (enable interaction with the AirTune service)
WEP-3ax(config):/airtune# save (save configuration)

AirTune service configuration is described in the SoftWLC controller documentation. 

802.11k configuration

802.11k roaming can be organized between any networks (open/encrypted). If the access point is configured to work with the 802.11k protocol, then, when the client connects, the access point sends a list of "friendly" access points to which the client can switch while roaming. The list contains information about the MAC addresses of access points and the channels on which they operate.

Using 802.11k reduces the time it takes the client to find another network when roaming because the client does not have to scan for channels where there are no target access points available for switching.

This type of roaming is only available for client devices that support 802.11k.

Below is an example of how to configure 802.11k on an access point – making a list of "friendly" access points.

WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config# enabled false
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config# mac
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac# add E8:28:C1:FC:D6:90 (where E8:28:C1:FC:D6:90 – MAC address of the "friendly" access point. Maximum number: 256)
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac# E8:28:C1:FC:D6:90
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac/E8:28:C1:FC:D6:90# channel 132 (where 132 – channel, on which the access point with E8:28:C1:FC:D6:90 MAC address is operating)
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac/E8:28:C1:FC:D6:90# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac# add E8:28:C1:FC:D6:70 (where E8:28:C1:FC:D6:70 – MAC address of the "friendly" access point)
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac# E8:28:C1:FC:D6:70
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac/E8:28:C1:FC:D6:70# channel 36 (where 36 – channel, on which the access point with E8:28:C1:FC:D6:70 MAC address is operating)
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac/E8:28:C1:FC:D6:70# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config/mac# exit
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config# enabled true (enable access point operation using the 802.11k protocol)
WEP-3ax(config):/interface/wlan1-vap0/vap/w80211kv-config# save (save configuration)

802.11k configuration via AirTune

The feature is supported starting from WEP-3ax firmware version 1.6.0, AirTune version 1.4.0.

For 802.11k auto-configuration on the access point via AirTune, enable 802.11k functionality on SSID and interaction with the AirTune. 
Below is an example of how to configure 802.11k via AirTune.

WEP-3ax(config):/interface/wlan1-vap1/vap/w80211kv-config# enabled true (enable 802.11k protocol support on the VAP)
WEP-3ax(config):/interface/wlan1-vap1/vap/w80211kv-config# exit
WEP-3ax(config):/interface/wlan1-vap1/vap# exit
WEP-3ax(config):/interface/wlan1-vap1# exit

WEP-3ax(config):/interface# exit
WEP-3ax(config):/#
 airtune
WEP-3ax(config):/airtune# airtune_service_url ws://192.168.1.20:8099/apb/rrm (where 192.168.1.20 is an IP address of the server, on which the AirTune service is installed)
WEP-3ax(config):/airtune# enabled true (enable interaction with the AirTune service)
WEP-3ax(config):/airtune# save (save configuration)

AirTune service configuration is described in the SoftWLC controller documentation. 

802.11v configuration

802.11v roaming can be organized between any networks (open/encrypted). If an access point is configured to work with 802.11v, then during its operation the device sends a special packet (BSS Transition) to the client side recommending that the client roams. Whether or not the client device will follow the access point's recommendation is impossible to guarantee, because the decision to switch to another access point is ultimately made by the client side. In conjunction with the 802.11k standard, in a message with a recommendation to switch the client is also sent a list of recommended roaming access points, indicating on what channel each point works and what standard (IEEE 802.11n/ac/ax). Then the client analyzes the air and make a decision depending on the signal level, channel load, the configuration of the remote access point.

This type of roaming is only available for client devices that support 802.11v.

wl -i wlan1-vap4 wnm_bsstrans_req 7 150 84:ab:1a:c6:db:17 0 0 (sending a roaming recommendation message to a client with MAC address 84:ab:1a:c6:db:17 connected to wlan1-vap4. If the client does not switch to another access point within 15 seconds after sending this message, the access point will forcibly disconnect the client device from the wireless network)
wl -i wlan1 wnm_bsstrans_req 3 150 84:ab:1a:c6:db:17 5 0 (sending a roaming recommendation message to a client with MAC address 84:ab:1a:c6:db:17, connected to wlan1-vap0. Sending a message without forcing the client device to disconnect from the wireless network)

Radio configuration

In Radio, automatic selection of the operating channel is used by default. To set the channel manually or to change the power, use the following commands:

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan0
WEP-3ax(config):/interface/wlan0# wlan
WEP-3ax(config):/interface/wlan0/wlan# radio
WEP-3ax(config):/interface/wlan0/wlan/radio# channel X (where X – the number of the static channel on which the point will operate)
WEP-3ax(config):/interface/wlan0/wlan/radio# auto-channel false (disable automatic channel selection functionality. To enable, enter true)
WEP-3ax(config):/interface/wlan0/wlan/radio# use-limit-channels false (disable Use Limit Channels. To enable, enter true)
WEP-3ax(config):/interface/wlan0/wlan/radio# bandwidth X (where X – channel bandwidth)
WEP-3ax(config):/interface/wlan0/wlan/radio# tx-power X (where X – power level in dBm. The parameter may take values: for Radio 2.4 GHz (wlan0): 6–16 dBm; for Radio 5 GHz (wlan1): 10–19 dBm) 
WEP-3ax(config):/interface/wlan0/wlan/radio# save (save configuration)


The following channels are available to be selected for Radio 2.4 GHz:

  • with 20 MHz channel width: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13.
  • with 40 MHz channel width:
    • if "control-sideband" = lower: 1, 2, 3, 4, 5, 6, 7, 8, 9.
    • if "control-sideband" = upper: 5, 6, 7, 8, 9, 10, 11, 12, 13.

The following channels are available to be selected for Radio 5 GHz:

  • with 20 MHz channel width: 36, 40, 44, 48, 52, 56, 60, 64, 132, 136, 140, 144, 149, 153, 157, 161, 165.
  • with 40 MHz channel width:
    • if "control-sideband" = lower: 36, 44, 52, 60, 132, 140, 149, 157.
    • if "control-sideband" = upper: 40, 48, 56, 64, 136, 144, 153, 161.
  • with 80 MHz channel width: 36, 40, 44, 48, 52, 56, 60, 64, 132, 136, 140, 144, 149, 153, 157, 161.

Advanced Radio settings

WEP-3ax(config):/interface/wlan0/wlan/radio# work-mode X (where X – radio interface operation mode according to the IEEE 802.11 standard. Possible values: for Radio 2.4 GHz (wlan0): bgn, bgnax, ax; for Radio 5 GHz (wlan1): anac, anacax, ax)


WEP-3ax(config):/interface/wlan0/wlan/radio# use-limit-channels true (enable the use of a limited list of channels in the auto channel selection operation. To disable, enter false)
WEP-3ax(config):/interface/wlan0/wlan/radio# limit-channels '1 6 11' (where 1 6 11 – channels of the band in which the configurable radio interface can operate)


WEP-3ax(config):/interface/wlan0/wlan/radio# control-sideband lower (parameter may take the following values: lower, upper. Default: lower)


WEP-3ax(config):/interface/wlan0/wlan/radio# sgi true (enable the use of a short guard interval for data transfer – 400 ns instead of 800 ns. To disable, enter false)


WEP-3ax(config):/interface/wlan0/wlan/radio# stbc true (enable the Space-Time Block Coding (STBC) method, aimed at improving the reliability of data transmission. To disable, enter false)


WEP-3ax(config):/interface/wlan0/wlan/radio# aggregation true (enable aggregation on Radio – support for AMPDU/AMSDU. To disable, enter false)


WEP-3ax(config):/interface/wlan0/wlan/radio# short-preamble true (enable the short packet preamble. To disable, enter false)


WEP-3ax(config):/interface/wlan0/wlan/radio# wmm true (enable the support for WMM (Wi-Fi Multimedia). To disable, enter false)


Only Radio 5 GHz (wlan1) is configured

WEP-3ax(config):/interface/wlan1/wlan/radio# dfs X (where X – DFS mechanism operation mode. May take values: forced – mechanism is disabled, DFS channels are available for selection; auto – mechanism is enabled; disabled – mechanism is disabled, DFS channels are unavailable for selection)


WEP-3ax(config):/interface/wlan0/wlan/radio# obss-coex true (enable automatic change of channel width from 40 MHz to 20 MHz with congested radio environment. To disable, enter false)


WEP-3ax(config):/interface/wlan1/wlan/radio/bss-coloring# enable true (enable the BSS Coloring mechanism. To disable, enter false. Default: true)
WEP-3ax(config):/interface/wlan1/wlan/radio/bss-coloring#bss-color X (where X – color number. The defined value of BSS Color will be announced in all beacon and probe packets from the access point, if it works with 802.11ax support. The parameter can accept the values: 1–63. Default: 0 (autoselect))

DHCP option 82 configuration

DHCP option 82 is configured separately for each radio interface. This section provides examples of setting up option 82 for Radio 2.4 GHz – wlan0.

Operation mode of DHCP snooping:

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan0 (configuration will be done for Radio 2.4 GHz. To configure option 82 on Radio 5 GHz – enter wlan1)
WEP-3ax(config):/interface/wlan0# common
WEP-3ax(config):/interface/wlan0/common# dhcp-snooping
WEP-3ax(config):/interface/wlan0/common/dhcp-snooping# dhcp-snooping-mode replace (set DHCP snooping to replace mode) 

If on the radio interface the option 82 processing policy is configured to replace, the following parameters become available for configuration:

WEP-3ax(config):/interface/wlan0/common/dhcp-snooping# dhcp-option-82-CID-format custom (where custom – replacement of the CID content with the value specified in the dhcp-option-82-custom-CID parameter. The parameter can take values: APMAC-SSID – replacement of the CID content with <MAC address of the access point>-<SSID name>. SSID – replacement of the CID content with SSID name, to which the client is connected. By default: APMAC-SSID)
WEP-3ax(config):/interface/wlan0/common/dhcp-snooping# dhcp-option-82-RID-format custom (where custom – replacement of the RID content with the value specified in the dhcp-option-82-custom-RID parameter. The parameter can take values: ClientMAC – replacement of the RID content with MAC address of the client device. APMAC replacement of the RID content with MAC address of the access point. APdomain — replacement of the RID content with the domain where the access point is located. By default: ClientMAC)
WEP-3ax(config):/interface/wlan0/common/dhcp-snooping# dhcp-option-82-custom-CID longstring (where longstring – value from 1 to 52 characters, which will be transmitted in CID. If the value of dhcp-option-82-custom-CID parameter is not defined, the access point will change the CID to the default value: <MAC address of the access point>-<SSID name>)
WEP-3ax(config):/interface/wlan0/common/dhcp-snooping# dhcp-option-82-custom-RID longstring (where longstring – value from 1 to 63 characters, which will be transmitted in RID. If the value of dhcp-option-82-custom-RID parameter is not defined, the access point will change the RID to the default value: MAC address of the client device)
WEP-3ax(config):/interface/wlan0/common/dhcp-snooping# dhcp-option-82-MAC-format radius (selecting octet delimiter of the MAC address which is transmitted in RID and CID. radius – a dash is used as a delimiter: AA-BB-CC-DD-EE-FF; default – a colon is used as a delimiter: AA:BB:CC:DD:EE:FF)

WDS configuration

When configuring a WDS connection, it is necessary to select the same channel and channel width in the radio interface settings on the the devices that will be connected via WDS. Auto-channel should be disabled and the DFS option should be set to "off" or "forced".

More detailed information about configuring the radio interface via the command line can be found in the Radio Settings section.


When configuring a WDS connection on the Radio 2.4/Radio 5 GHz it is necessary to enable VAP0 on the Radio 2.4/Radio 5 GHz. The encryption modes on VAP and WDS interfaces should be the same. 

More detailed information about configuring VAPs can be found in the Virtual Wi-Fi access points (VAPs) configuration section. 

Below is the configuration of a WDS connection on the Radio 5 GHz interface (wlan1).

WEP-3ax(root):/# configure
WEP-3ax(config):/# interface
WEP-3ax(config):/interface# wlan1-wds0 (WDS link selection. Possible values for Radio 2.4 GHz: wlan0–wds0 – wlan0–wds7, for Radio 5 GHz: wlan1–wds0 – wlan1–wds7)
WEP-3ax(config):/interface/wlan1-wds0# wds
WEP-3ax(config):/interface/wlan1-wds0/wds# mac-addr XX:XX:XX:XX:XX:XX (MAC address of the remote access point radio interface, that can be found by entering the monitoring radio-interface command on the remote acess point)
WEP-3ax(config):/interface/wlan1-wds0/wds# ssid WDS (SSID name for creating an encrypted WDS)
WEP-3ax(config):/interface/wlan1-wds0/wds# security-mode WPA2 (encryption mode. Possible values: WPA2, off — without password)
WEP-3ax(config):/interface/wlan1-wds0/wds# key-wpa password (WPA key. The key length is from 8 to 63 characters)
WEP-3ax(config):/interface/wlan1-wds0/wds# exit
WEP-3ax(config):/interface/wlan1-wds0# common
WEP-3ax(config):/interface/wlan1-wds0/common# enabled true (enable WDS. To disable, enter false)
WEP-3ax(config):/interface/wlan1-wds0/common# save (save configuration)

The remote access point is configured in the same way.

System settings

Device firmware upgrade

WEP-3ax(root):/# firmware upload tftp <IP address of TFTP server> <Firmware file name> (example: firmware upload tftp 192.168.1.100 WEP-3ax-1.10.0_build_105.tar.gz)
WEP-3ax(root):/# firmware upgrade


WEP-3ax(root):/# firmware upload http <firmware file URL> (example: firmware upload http http://192.168.1.100:8080/files/WEP-3ax-1.10.0_build_105.tar.gz)
WEP-3ax(root):/# firmware upgrade


WEP-3ax(root):/# firmware switch

Device configuration management

WEP-3ax(root):/# manage-config reset-to-default


WEP-3ax(root):/# manage-config reset-to-default-without-management


WEP-3ax(root):/# manage-config download tftp <IP address of TFTP server> (example: manage-config download tftp 192.168.1.100)


WEP-3ax(root):/# manage-config upload tftp <IP address of TFTP server> <configuration file name> (example: manage-config upload tftp 192.168.1.100 config.json)
WEP-3ax(root):/# manage-config apply (apply configuration on access point)

Device reboot

WEP-3ax(root):/# reboot

Setting the date and time

WEP-3ax(root):/# configure
WEP-3ax(config):/# date-time
WEP-3ax(config):/date-time# mode ntp (enable NTP mode)
WEP-3ax(config):/date-time# ntp
WEP-3ax(config):/date-time/ntp# server <IP address of NTP server> (specify the primary NTP server address)
WEP-3ax(config):/date-time/ntp# alt-servers (specify alternative NTP servers)
WEP-3ax(config):/date-time/ntp/alt-servers# add <Domain name/IP address of NTP server in configuration> (create a configuration section for an alternative NTP server. Maximum number: 8. To delete, use the del command)
WEP-3ax(config):/date-time/ntp/alt-servers# exit
WEP-3ax(config):/date-time/ntp# exit
WEP-3ax(config):/date-time# common
WEP-3ax(config):/date-time/common# timezone 'Asia/Novosibirsk (Novosibirsk)' (set the time zone)
WEP-3ax(config):/date-time/common# save (save configuration)

Advanced system settings

WEP-3ax(root):/# configure
WEP-3ax(config):/# system
WEP-3ax(config):/system# global-station-isolation true (enable global isolation of traffic between clients of different VAPs and different radio interfaces. To disable, enter false)
WEP-3ax(config):/system# save (save configuration)


WEP-3ax(root):/# configure
WEP-3ax(config):/# system
WEP-3ax(config):/system# hostname WEP-3ax_room2 (where WEP-3ax_room2 is a new hostname. The parameter can contain from 1 to 63 characters: Latin uppercase and lowercase letters, numbers, hyphen "-" (the hyphen can not be the last character in the name). Default: WEP-3ax)
WEP-3ax(config):/system# save (save configuration)


WEP-3ax(root):/# configure
WEP-3ax(config):/# system
WEP-3ax(config):/system# ap-location ap.test.root (where ap.test.root is the domain of the device tree node of the EMS management system in which the access point is located. Default: root)
WEP-3ax(config):/system# save (save configuration)


WEP-3ax(root):/# configure
WEP-3ax(config):/# authentication
WEP-3ax(config):/authentication# admin-password newpassword (where newpassword is a new password to log in to the access point. Default: password)
WEP-3ax(config):/authentication# save (save configuration)


WEP-3ax(root):/# configure
WEP-3ax(config):/# system
WEP-3ax(config):/system # nas-id Lenina_1.Novovsibirsk.root (where Lenina_1.Novovsibirsk.root is an identifier of this access point. The parameter is dedicated to identify the device on the RADIUS server in case RADIUS expects a value other than the MAC address. Default: MAC address of AP)
WEP-3ax(config):/system # save (save configuration)


WEP-3ax(root):/# configure
WEP-3ax(config):/# lldp
WEP-3ax(config):/lldp# enabled true (enable LLDP functionality. To disable, enter false. Default: true
WEP-3ax(config):/lldp# tx-interval 60 (change the period of sending LLDP messages. Default: 30)
WEP-3ax(config):/lldp# system-name WEP-3ax_reserv (where WEP-3ax_reserv is a new device name. Default: WEP-3ax)
WEP-3ax(config):/lldp# save (save configuration)

APB service configuration 

The APB service is used to provide portal roaming of clients between access points connected to the service. 

WEP-3ax(root):/# configure
WEP-3ax(config):/# captive-portal
WEP-3ax(config):/captive-portal# apbd 
WEP-3ax(config):/captive-portal/apbd# roam_service_url <APB service address> (example: roam_service_url ws://192.168.1.100:8090/apb/broadcast)
WEP-3ax(config):/captive-portal/apbd# enabled true (enable APB service. To disable, enter false)
WEP-3ax(config):/captive-portal/apbd# save (save configuration)

Configuration of tcpdump utility

The tcpdump utility is designed to analyze and intercept network traffic. This utility allows to intercept traffic from various access point interfaces for further analysis, to change recording parameters (time limits, file size), as well as to send the finished file via TFTP to the server.

Commands for using tcpdump utility

To take a dump from the Ethernet interface of the access point, use the eth1 interface.
To take a dump from radio interfaces:
radiotap0 – the interface corresponds to 2.4 GHz band (wlan0);
radiotap1 – the interface corresponds to 5 GHz band (wlan1).


WEP-3ax(root):/# configure
WEP-3ax(config):/# tcpdump
WEP-3ax(config):/tcpdump# interface radiotap0 (specify interface, for example, radiotap0)
WEP-3ax(config):/tcpdump# time-limit 600 (limit for dumping by time in seconds, for example, 600s=10min)
WEP-3ax(config):/tcpdump# file-size-limit 10 (imit for dumping by file size in MB)
WEP-3ax(config):/tcpdump# mac-filter e0:d9:e3:4e:60:a1 (filtering by MAC address. The parameter is not obligatory)
WEP-3ax(config):/tcpdump# tftp-server-ip: 192.168.1.1 (address of TFTP server, where it is planned to upload a file) 
WEP-3ax(config):/tcpdump# tftp-file-name: AP1_dump.pcap (name of uploading file)
WEP-3ax(config):/tcpdump# save (save configuration)


WEP-3ax(config):/tcpdump# exit
WEP-3ax(config):/# monitoring tcpdump-start (command to enbale a file recording) 
WEP-3ax(config):/# monitoring tcpdump-status (view the current operating status of the utility)
WEP-3ax(config):/# monitoring tcpdump-stop (command to stop recording a file) 
WEP-3ax(config):/# monitoring tcpdump-tftp-send (command to send a file to the server via TFTP protocol)

Configuration of IGMP

In the igmp-config section the user can configure the following parameters: enabled, query-interval, querycount, query-resp-interval. Default: enabled true.

WEP-3ax(root):/# configure
WEP-3ax(config):/# igmp-config
WEP-3ax(config):/igmp-config# enabled true (enable multicast traffic. To disable, enter false)
WEP-3ax(config):/igmp-config# query-interval X (where Х – interfval for sending IGMP General Query messages in seconds. Accepted values: from 30 to 18000 seconds. Default: 125)
WEP-3ax(config):/igmp-config# query-count Х (where Х – value of the expected number of packets lost on the channel (QRV filed in the IGMP request). Possible values: from 1 to 7. Default: 7)
WEP-3ax(config):/igmp-config# query-resp-interval X (where Х – maximum response time to an IGMP request. Possible values: from 50 to 200 tenths of a second. Default: 100)
WEP-3ax(config):/igmp-config# save (save configuration)

Monitoring

Wi-Fi Clients

WEP-3ax(root):/# monitoring associated-clients

 index                    | 0
 hw-addr                  | ac:c4:13:1c:aa:aa
 hw-addr                  | 62:33:e6:73:bf:ec
 authenticated            | yes
 associated               | yes
 authorized               | yes
 ip-addr                  | 192.168.40.248
 hostname                 | Pixel-6
 identity                 | ivanov.ivan
 domain                   | enterprise.service.root
 rssi-1                   | -64
 rssi-2                   | -66
 rssi-3                   | 0
 rssi-4                   | 0
 noise-1                  | -94
 noise-2                  | -95
 noise-3                  | 0
 noise-4                  | 0
 snr-1                    | 30
 snr-2                    | 29
 snr-3                    | 0
 snr-4                    | 0
 tx-rate                  | HE NSS2-MCS11 2xLTF GI 0.8us 286.8
 rx-rate                  | HE NSS2-MCS9 2xLTF GI 0.8us 229.4
 actual-tx-rate           | 5
 actual-rx-rate           | 4
 tx-fails                 | 1
 tx-retry-count           | 0
 rx-retry-count           | 328
 tx-bw                    | 20
 rx-bw                    | 20
 tx-period-retry          | 0
 link-capacity            | 100%
 link-quality             | 100%
 link-quality-common      | 100%
 uptime                   | 00:13:46
 interface                | wlan1-vap2
 ssid                     | Eltex-Test
 using-802.11r            | yes
 using-802.11k            | no
 using-802.11v            | no
 wireless-mode            | ax
 name                     | wlan1-vap2:sta-0

  Rate                  Transmitted            Received                
---------------------------------------------------------------------
 Total Packets:       | 50807                | 2527                 |
 TX success:          | 100                  |                      |
 Total Bytes:         | 20608509             | 491365               |
 Data Packets:        | 50803                | 2522                 |
 Data Bytes:          | 20608377             | 490906               |
 Mgmt Packets:        | 4                    | 5                    |
 Mgmt Bytes:          | 132                  | 459                  |
 Dropped Packets:     | 0                    | 772                  |
 Dropped Bytes:       | 0                    | 18495                |
 Lost Packets:        | 1                    |                      |
---------------------------------------------------------------------
 
 Rate                  Transmitted            Received                
---------------------------------------------------------------------
 ofdm6                | 0              |   0%|            829 |  35%|
 he-nss1-mcs0         | 0              |   0%|              1 |   0%|
 he-nss1-mcs8         | 0              |   0%|              7 |   0%|
 he-nss1-mcs11        | 0              |   0%|              2 |   0%|
 he-nss2-mcs0         | 0              |   0%|              1 |   0%|
 he-nss2-mcs1         | 0              |   0%|              1 |   0%|
 he-nss2-mcs2         | 0              |   0%|              4 |   0%|
 he-nss2-mcs3         | 0              |   0%|             12 |   0%|
 he-nss2-mcs4         | 0              |   0%|            161 |   6%|
 he-nss2-mcs5         | 0              |   0%|             92 |   3%|
 he-nss2-mcs6         | 19             |   0%|            182 |   7%|
 he-nss2-mcs7         | 165            |   1%|            196 |   8%|
 he-nss2-mcs8         | 228            |   2%|            213 |   9%|
 he-nss2-mcs9         | 553            |   4%|            227 |   9%|
 he-nss2-mcs10        | 92             |   0%|            254 |  10%|
 he-nss2-mcs11        | 10335          |  90%|            176 |   7%|
---------------------------------------------------------------------


Device information

WEP-3ax(root):/# monitoring information

   system-time: 09:19:58 22.03.2022
   uptime: 13 d 00:51:28
   software-version: 1.10.0 build 105
   uboot-version: 1.10.0 build 105
   secondary-software-version: 1.10.0 build 99
   boot-version: 1.4.1 build 6
   memory-usage: 36
   memory-free: 638
   memory-used: 368
   memory-total: 1006
   cpu: 0.18
   is-default-config: false
   board-type: WEP-3ax
   hw-platform: WEP-3ax
   factory-mac: CC:9D:A2:xx:xx:xx
   factory-serial-number: WP42001953
   hw-revision: 2v2
   tunnel-ip: 10.24.201.148
   last-reboot-reason: firmware update


Network information

WEP-3ax(root):/# monitoring wan-status

   interface: br0
   protocol: dhcp
   ip-address: 192.168.1.15
   mac: e8:28:c1:xx:xx:xx
   mask: 255.255.255.0
   gateway: 192.168.1.1
   DNS-1: 192.168.1.253
   DNS-2: 172.16.7.40
   rx-bytes: 82542744
   rx-packets: 1119782
   tx-bytes: 2281191
   tx-packets: 8853

WEP-3ax(root):/# monitoring ethernet

   link: up
   speed: 1000
   duplex: enabled
   rx-bytes: 82842279
   rx-packets: 1124216
   tx-bytes: 2283061
   tx-packets: 8875

WEP-3ax(root):/# monitoring arp

#        ip                mac              
--------------------------------------------
0        192.168.1.1       02:00:48:xx:xx:xx
1        192.168.1.151     2c:fd:a1:xx:xx:xx

WEP-3ax(root):/# monitoring route

Destination       Gateway           Mask              Flags      Interface 
--------------------------------------------------------------------------
0.0.0.0           192.168.1.1      0.0.0.0            UG         br0       
192.168.1.0       0.0.0.0          255.255.255.0      U          br0  

WEP-3ax(root):/# monitoring lldp

Port     Device ID           Port ID          System Name        Capabilities   TTL    
------   -----------------   --------------   ----------------   ------------   -----  
eth0     e0:d9:e3:eb:66:80   gi1/0/10                                           120


Wireless interfaces

WEP-3ax(root):/# monitoring radio

   wlan0:
      name: wlan0
      hwaddr: CC:9D:A2:xx:xx:xx
      status: on
      channel: 1
      bandwidth: 20
      frequency: 2412
      power: 16.0
      mode: bgnax
   wlan1:
      hwaddr: CC:9D:A2:xx:xx:xx
      status: on
      channel: 36
      bandwidth: 20
      frequency: 5180
      power: 19.0
      mode: anacax


Event log

WEP-3ax(root):/# monitoring events

Feb 25 05:00:19 WEP-3ax syslog.info syslogd: started: BusyBox v1.30.1

Feb 25 05:00:20 WEP-3ax daemon.info networkd[907]: Networkd started

Feb 25 05:00:26 WEP-3ax daemon.info networkd[907]: DHCP-client: Interface br0 obtained lease on 192.168.1.15.

Feb 25 05:14:59 WEP-3ax auth.info login[1738]: root login on 'pts/0'

Feb 25 05:57:22 WEP-3ax daemon.info networkd[907]: DHCP-client: Interface br0 renew lease on 192.168.1.15.

Feb 25 06:22:55 WEP-3ax daemon.info configd[651]: The AP startup configuration was updated successfully.

To clear the event log enter the monitoring clear-events command.

Scan Environment

Please note, while scanning the air, the radio interface of the device will be disabled, which will result in the inability to transmit data to Wi-Fi clients during the scan.


WEP-3ax(root):/# monitoring scan-wifi

SSID                             |Mode |Security|MAC               |Channel|RSSI, dBm|Bandwidth, MHz
---------------------------------|-----|--------|------------------|-------|---------|--------------
HOT_SSID                         |     |off     |e8:28:c1:da:cf:f2 |1      |-40      |20            
EltexWiFi                        |     |off     |e8:28:c1:fc:d2:c0 |1      |-63      |20            
Eltex-Local                      |     |wpa/wpa2|e8:28:c1:fc:d6:40 |1      |-30      |20            
test_wpa                         |     |wpa/wpa2|a8:f9:4b:b0:22:a3 |1      |-46      |20            
EltexWiFi2.4G                    |     |wpa/wpa2|e2:d9:e3:98:36:bd |5      |-62      |20            
Nikitenko_2.4                    |     |off     |aa:f9:4b:2d:04:f3 |11     |-65      |20            
Eltex-Local                      |     |wpa/wpa2|e8:28:c1:da:cf:01 |11     |-56      |20               
BRAS-Guest                       |     |off     |e8:28:c1:da:cf:06 |48     |-66      |20            
Eltex-Guest                      |     |off     |e8:28:c1:da:cf:07 |48     |-68      |20            
Eltex-Local                      |     |wpa/wpa2|e8:28:c1:da:cf:08 |48     |-68      |20            
WEP-2L_open                      |     |off     |e8:28:c1:da:cf:09 |48     |-68      |20                                                
EltexWiFi5G                      |     |wpa2    |e2:d9:e3:9f:6b:8c |153    |-76      |80            
!wep3ax_test5                    |     |off     |e8:28:c1:fc:74:30 |157    |-81      |80            
test_1                           |     |off     |a8:f9:4b:17:02:33 |161    |-71      |20                
...


Spectrum Analyzer

The WEP-3ax has the possibility to run the spectrum analyzer on radio interfaces wlan0 (2.4 GHz) and wlan1 (5 GHz). Below are the commands to start and monitor the spectrum analyzer.

Note that running the spectrum analyzer on the radio interface (Radio 2.4 GHz or Radio 5 GHz) will put it into scanning mode, which will disable all Wi-Fi clients connected to that radio interface.


The spectrum analyzer on the radio interface only works on the channels that are reflected in the "limit-channels" parameter. For example, if the wlan0 channel list contains channels '1 6 11', the spectrum analysis will only be performed for channels 1, 6 and 11. 

To analyze all channels of the band on which the radio interface operates, change the value of use-limit-channels in the radio interface settings to false. After receiving the results of the spectrum analyzer, return the value of use-limit-channels back to the original value – true.

For more information about configuring the radio interface via CLI, see Radio configuration section. 

WEP-3ax(root):/# monitoring spectrum-wlan0

Interface:    wlan0 last scanned channel:  11
 Channel| CCA
       1|  70%
       6|   0%
      11|  38%



WEP-3ax(root):/# monitoring spectrum-wlan1

Interface:    wlan1 last scanned channel:  48
 Channel| CCA
      36|   8%
      40|   7%
      44|   9%
      48|   6%



WEP-3ax(root):/# monitoring spectrum-status 

 wlan0:
 State - Idle
 Last run time - Thu Jul  1 16:31:46 2021
 Channel| CCA
       1|  70%
       6|   0%
      11|  38%

 wlan1:
 State - Idle
 Last run time - Thu Jul  1 16:32:53 2021
 Channel| CCA
      36|   8%
      40|   7%
      44|   9%
      48|   6%


The list of changes

Document versionIssue dateRevisions
Version 1.96.10.2023

Synchronization with firmware version 1.10.0

Changed:

  • 5.4.8 "Device information" submenu
  • 5.6.2 "VAP" submenu
  • 6.4.1 Advanced Radio settings 
  • 6.7.5 Advanced system settings 
  • 6.10 Configuration of IGMP
Version 1.807.07.2023

Synchronization with firmware version 1.9.0

Added:

  • 5.7 "WDS" menu 
  • 6.7 Configuration of WDS

Changed:

  • 2.2 Device specification
  • 6.8 System settings 
Version 1.714.02.2023

Synchronization with firmware version 1.8.1

Changed:

  • 5.6.2 "VAP" submenu
Version 1.609.12.2022

Synchronization with firmware version 1.8.0

Added:

  • 6.3.5 Configuration of VAP with RADIUS MAC authorization
  • 6.3.6 Configuration of backup RADIUS on VAP
  • 6.9 Configuration of IGMP
Version 1.515.08.2022

Synchronization with firmware version 1.7.0

Added:

  • 6.6 Configuring DHCP option 82
  • 6.9 Configuring TCPDUMP

Changed:

  • 5.5 "Radio" menu 
Version 1.425.03.2022

Synchronization with firmware version 1.6.0

Added:

  • 2.4 Radiation patterns

Changed:

  • 5.4.4 "Spectrum Analyzer" submenu
  • 6.3.5 Advanced VAP settings
Version 1.303.11.2021Synchronization with firmware version 1.5.0
Version 1.231.07.2021

Synchronization with firmware version 1.4.0

Added:

  • 5.4.4 "Spectrum Analyzer" submenu
  • 6.2.1 Network parameters configuration using the set-management-vlan-mode utility

  • 6.5.5 Advanced system settings 
  • 6.7.7 Spectrum Aanalyzer

Changed:

  • 6.3.5 Advanced VAP settings
  • 6.7.5 Event log
Version 1.126.03.2021Synchronization with firmware version 1.3.0
Version 1.030.06.2020First issue
Firmware version 1.10.0