The SonicPoint profile configuration process for 802.11n slightly different than for 802.11a or
802.11g. The following sections describe how to configure SonicPoint profiles:
For a SonicPoint overview, see
SonicPoint > SonicPoints
.
You can add any number of SonicPoint profiles. To configure a SonicPoint provisioning profile:
Step 1
|
To add a new profile click
Add SonicPointN
below the list of SonicPoint 802.11n provisioning profiles. To edit an existing profile, select the profile and click the Configure icon in the same line as the profile you are editing.
|
Step 2
|
In the
Settings
tab of the Add Profile window, specify:
|
|
–
|
Enable SonicPoint
: Check this to automatically enable each SonicPoint when it is provisioned with this profile.
|
|
–
|
Retain Settings
: Check this to have the SonicPointNs provisioned by this profile retain these settings until the appliance is rebooted.
|
|
–
|
Name Prefix
: Enter a prefix for the names of all SonicPointNs connected to this zone. When each SonicPointN is provisioned it is given a name that consists of the name prefix and a unique number, for example: “SonicPoint 126008.”
|
|
–
|
Country Code
: Select the country where you are operating the SonicPointNs. The country code determines which regulatory domain the radio operation falls under.
|
Step 3
|
In the
802.11n
tab, configure the radio settings for the 802.11n radio:
|
|
–
|
Enable Radio
: Check this to automatically enable the 802.11n radio bands on all SonicPoints provisioned with this profile.
|
|
–
|
Radio Mode
: Select your preferred radio mode from the Radio Mode
menu. The wireless security appliance supports the following modes:
|
|
•
|
2.4GHz 802.11n Only
- Allows only 802.11n clients access to your wireless network. 802.11a/b/g clients are unable to connect under this restricted radio mode.
|
|
•
|
2.4GHz 802.11n/g/b Mixed
- Supports 802.11b, 802.11g, and 802.11n clients simultaneously. If your wireless network comprises multiple types of clients, select this mode.
|
|
•
|
2.4GHz 802.11g
Only
- If your wireless network consists only of 802.11g clients, you may select this mode for increased 802.11g performance. You may also select this mode if you wish to prevent 802.11b clients from associating.
|
|
•
|
5 GHz 802.11n Only
- Allows only 802.11n clients access to your wireless network. 802.11a/b/g clients are unable to connect under this restricted radio mode.
|
|
•
|
5 GHz 802.11n/a Mixed
- Supports 802.11n and 802.11a clients simultaneously. If your wireless network comprises both types of clients, select this mode.
|
|
•
|
5 GHz 802.11a Only
- Select this mode if only 802.11a clients access your wireless network.
|
|
–
|
SSID
: Enter a recognizable string for the SSID of each SonicPoint using this profile. This is the name that will appear in clients’ lists of available wireless connections.
|
When the wireless radio is configured for a mode that supports 802.11n, the following options
are displayed:
Radio Band
(802.11n only): Sets the band for the 802.11n radio:
|
•
|
Auto
- Allows the appliance to automatically detect and set the optimal channel for wireless operation based on signal strength and integrity. This is the default setting.
|
|
•
|
Standard - 20 MHz Channel
- Specifies that the 802.11n radio will use only the standard 20 MHz channel. When this option is selected, the Standard Channel
pulldown menu is displayed.
|
|
–
|
Standard Channel
- This pulldown menu only displays when the 20 MHz channel is selected. By default, this is set to Auto
, which allows the appliance to set the optimal channel based on signal strength and integrity. Optionally, you can select a single channel within the range of your regulatory domain. Selecting a specific a channel can also help with avoiding interference with other wireless networks in the area.
|
|
•
|
Wide - 40 MHz Channel
- Specifies that the 802.11n radio will use only the wide 40 MHz channel. When this option is selected, the Primary Channel
and Secondary Channel
pulldown menus are displayed:
|
|
–
|
Primary Channel
- By default this is set to Auto
. Optionally, you can specify a specific primary channel.
|
|
–
|
Secondary Channel
- The configuration of this pulldown menu is controlled by your selection for the primary channel:
|
Enable Short Guard Interval
: Specifies the short guard interval of 400ns (as opposed to the standard guard interval of 800ns). The guard interval is a pause in transmission intended to avoid data loss from interference or multipath delays.
Enable Aggregation
: Enables 802.11n frame aggregation, which combines multiple frames to reduce overhead and increase throughput.
|
Tip
|
The
Enable Short Guard Interval
and Enable aggregation
options can slightly improve throughput. They both function best in optimum network conditions where users have strong signals with little interference. In networks that experience less than optimum conditions (interference, weak signals, etc.), these options may introduce transmission errors that eliminate any efficiency gains in throughput.
|
ACL Enforcement
: Select this to enforce Access Control by allowing or denying traffic from specific devices. Select a MAC address group from the Allow List
to automatically allow traffic from all devices with MAC address in the group. Select a MAC address group from the Deny
List
to automatically deny traffic from all devices with MAC address in the group. The deny list is enforced before the Allow list.
Step 4
|
In the
Wireless Security
section of the 802.11n Radio
tab, configure the following settings:
|
|
–
|
Authentication Type
: Select the method of authentication for your wireless network. You can select WEP - Both (Open System & Shared Key)
, WEP - Open System
, WEP - Shared Key
, WPA - PSK
, WPA - EAP
, WPA2-PSK
, WPA2-EAP
, WPA2-AUTO-
PSK
,
and WPA2-AUTO-EAP
.
|
|
–
|
Default Key
: Select which key in the list below is the default key, which will be tried first when trying to authenticate a user.
|
|
–
|
Key Entry
: Select whether the key is alphanumeric or hexadecimal.
|
|
–
|
Key 1 - Key 4
: Enter the encryptions keys for WEP encryption. Enter the most likely to be used in the field you selected as the default key.
|
|
–
|
Cipher Type
: The cipher that encrypts your wireless data. Choose either TKIP (older, more compatable), AES (newer, more secure), or Both (backward compatable).
|
|
–
|
Group Key Interval
: The time period for which a Group Key is valid. The default value is 86400 seconds. Setting to low of a value can cause connection issues.
|
|
–
|
Passphrase
(PSK only)
: This is the passphrase your network users must enter to gain network access.
|
Step 5
|
In the
Advanced
tab, configure the performance settings for the 802.11n radio. For most 802.11n advanced options, the default settings give optimum performance.
|
|
–
|
Hide SSID in Beacon
: Check this option to have the SSID broadcast as part of the wireless beacon, rather than as a separate broadcast.
|
|
–
|
Schedule IDS Scan
: Select a time when there are fewer demands on the wireless network to schedule an Intrusion Detection Service (IDS) scan to minimize the inconvenience of dropped wireless connections.
|
|
–
|
Data Rate
: Select the speed at which the data is transmitted and received. Best
automatically selects the best rate available in your area given interference and other factors. Or you can manually select a data rate.
|
|
–
|
Transmit Power
: Select the transmission power. Transmission power effects the range of the SonicPoint. You can select: Full Power
, Half (-3 dB)
, Quarter (-6 dB)
, Eighth
(-9 dB)
, or Minimum
.
|
|
–
|
Antenna Diversity
: The Antenna Diversity
setting determines which antenna the SonicPoint uses to send and receive data. When Best
is selected, the SonicPoint automatically selects the antenna with the strongest, clearest signal.
|
|
–
|
DTIM
Interval
: Enter the interval in milliseconds.
|
|
–
|
Preamble Length
: Select the length of the preamble--the initial wireless communication send when associating with a wireless host. You can select Long
or Short
.
|
|
–
|
Protection Mode
: Select the CTS or RTS protection. Select None
, Always
, or Auto
. None
is the default.
|
|
–
|
Protection Rate
: Select the speed for the CTS or RTS protection, 1 Mbps
, 2 Mbps
, 5
Mbps
, or 11 Mbps
.
|
When a SonicPoint unit is first connected and powered up, it will have a factory default
configuration (IP address 192.168.1.20, username: admin, password: password). Upon initializing, it will attempt to find a SonicOS device with which to peer. If it is unable to find a peer SonicOS device, it will enter into a stand-alone mode of operation with a separate stand-alone configuration allowing it to operate as a standard Access Point.
If the SonicPoint does locate, or is located by a peer SonicOS device, via the SonicWALL
Discovery Protocol, an encrypted exchange between the two units will ensue wherein the profile assigned to the relevant Wireless zone will be used to automatically configure (provision) the newly added SonicPoint unit.
As part of the provisioning process, SonicOS will assign the discovered SonicPoint device a
unique name, and it will record its MAC address and the interface and zone on which it was discovered. It can also automatically assign the SonicPoint an IP address, if so configured, so that the SonicPoint can communicate with an authentication server for WPA-EAP support. SonicOS will then use the profile associated with the relevant zone to configure the 2.4GHz and 5GHz radio settings.
Modifications to profiles will not affect units that have already been provisioned and are in an
operational state. Configuration changes to operational SonicPoint devices can occur in two ways:
|
•
|
Via manual configuration changes
– Appropriate when a single, or a small set of changes are to be affected, particularly when that individual SonicPoint requires settings that are different from the profile assigned to its zone.
|
Via un-provisioning
– Deleting a SonicPoint unit effectively un-provisions the unit, or clears its configuration and places it into a state where it will automatically engage the provisioning process anew with its peer SonicOS device. This technique is useful when the profile for a zone is updated or changed, and the change is set for propagation. It can be used to update firmware on SonicPoints, or to simply and automatically update multiple SonicPoint units in a controlled
fashion, rather than changing all peered SonicPoints at once, which can cause service disruptions.
For a SonicPoint overview, see
SonicPoint > SonicPoints
.
You can add any number of SonicPoint profiles. To configure a SonicPoint provisioning profile:
Step 1
|
To add a new profile click
Add
below the list of SonicPoint provisioning profiles. To edit an existing profile, select the profile and click the edit icon in the same line as the profile you are editing.
|
Step 2
|
In the
General
tab of the Add Profile window, specify:
|
|
–
|
Enable SonicPoint
: Check this to automatically enable each SonicPoint when it is provisioned with this profile.
|
|
–
|
Retain Settings
: Check this to have the SonicPoints provisioned by this profile retain these settings until the appliance is rebooted.
|
|
–
|
Name Prefix
: Enter a prefix for the names of all SonicPoints connected to this zone. When each SonicPoint is provisioned it is given a name that consists of the name prefix and a unique number, for example: “SonicPoint 126008.”
|
|
–
|
Country Code
: Select the country where you are operating the SonicPoints. The country code determines which regulatory domain the radio operation falls under.
|
|
–
|
802.11g Virtual AP Group
and 802.11a Virtual AP Group
: (optional; on SonicWALL NSA only) Select a Virtual Access Point (VAP) group to assign these SonicPoints to a VAP. This pulldown menu allows you to create a new VAP group. For more information on VAPs, see “SonicPoint > Virtual Access Point”
.
|
Step 3
|
In the
802.11g
tab, Configure the radio settings for the 802.11g (2.4GHz band) radio:
|
|
–
|
Enable 802.11g Radio
: Check this to automatically enable the 802.11g radio bands on all SonicPoints provisioned with this profile.
|
|
–
|
SSID
: Enter a recognizable string for the SSID of each SonicPoint using this profile. This is the name that will appear in clients’ lists of available wireless connections.
|
|
–
|
Radio Mode
: Select the speed of the wireless connection. You can choose 11Mbps -
802.11b
, 54 Mbps - 802.11g
, or 108 Mbps - Turbo G
mode. If you choose Turbo mode, all users in your company must use wireless access cards that support turbo mode.
|
|
–
|
Channel
: Select the channel the radio will operate on. The default is AutoChannel
, which automatically selects the channel with the least interference. Use AutoChannel unless you have a specific reason to use or avoid specific channels.
|
|
–
|
ACL Enforcement
: Select this to enforce Access Control by allowing or denying traffic from specific devices. Select a MAC address group from the Allow List
to automatically allow traffic from all devices with MAC address in the group. Select a MAC address group from the Deny List
to automatically deny traffic from all devices with MAC address in the group. The deny list is enforced before the Allow list.
|
|
–
|
Authentication Type
: Select the method of authentication for your wireless network. You can select WEP - Both (Open System & Shared Key)
, WEP - Open System
, WEP - Shared Key
, WPA - PSK
, WPA - EAP
, WPA2-PSK
, WPA2-EAP
, WPA2-AUTO-
PSK
,
and WPA2-AUTO-EAP
.
|
|
–
|
Default Key
: Select which key in the list below is the default key, which will be tried first when trying to authenticate a user.
|
|
–
|
Key Entry
: Select whether the key is alphanumeric or hexadecimal.
|
|
–
|
Key 1 - Key 4
: Enter the encryptions keys for WEP encryption. Enter the most likely to be used in the field you selected as the default key.
|
Step 4
|
In the
802.11g Advanced
tab, configure the performance settings for the 802.11g radio. For most 802.11g advanced options, the default settings give optimum performance.
|
|
–
|
Hide SSID in Beacon
: Check this option to have the SSID broadcast as part of the wireless beacon, rather than as a separate broadcast.
|
|
–
|
Schedule IDS Scan
: Select a time when there are fewer demands on the wireless network to schedule an Intrusion Detection Service (IDS) scan to minimize the inconvenience of dropped wireless connections.
|
|
–
|
Data Rate
: Select the speed at which the data is transmitted and received. Best
automatically selects the best rate available in your area given interference and other factors. Or you can manually select a data rate.
|
|
–
|
Transmit Power
: Select the transmission power. Transmission power effects the range of the SonicPoint. You can select: Full Power
, Half (-3 dB)
, Quarter (-6 dB)
, Eighth
(-9 dB)
, or Minimum
.
|
|
–
|
Antenna Diversity
: The Antenna Diversity
setting determines which antenna the SonicPoint uses to send and receive data. You can select:
|
|
•
|
Best
: This is the default setting. When Best
is selected, the SonicPoint automatically selects the antenna with the strongest, clearest signal. In most cases, Best
is the optimal setting.
|
|
•
|
1
: Select 1
to restrict the SonicPoint to use antenna 1 only. Facing the rear of the SonicPoint, antenna 1 is on the left, closest to the power supply.
|
|
•
|
2
: Select 2
to restrict the SonicPoint to use antenna 2 only. Facing the rear of the SonicPoint, antenna 2 is on the right, closest to the console port.
|
|
–
|
DTIM
Interval
: Enter the interval in milliseconds.
|
|
–
|
Preamble Length
: Select the length of the preamble--the initial wireless communication send when associating with a wireless host. You can select Long
or Short
.
|
|
–
|
Protection Mode
: Select the CTS or RTS protection. Select None
, Always
, or Auto
. None
is the default.
|
|
–
|
Protection Rate
: Select the speed for the CTS or RTS protection, 1 Mbps
, 2 Mbps
, 5
Mbps
, or 11 Mbps
.
|
|
–
|
CCK OFDM Power Delta
: Select the difference in radio transmit power you will allow between the 802.11b and 802.11g modes: 0 dBm, 1 dBm, or 2 dBm.
|
Step 5
|
Configure the settings in the
802.11a Radio
and 802.11a Advanced
tabs. These settings affect the operation of the 802.11a radio bands. The SonicPoint has two separate radios built in. Therefore, it can send and receive on both the 802.11a and 802.11g bands at the same time.
|
The settings in the
802.11a Radio
and 802.11a Advanced
tabs are similar to the settings in the 802.11g Radio
and 802.11g Advanced
tabs. Follow the instructions in step 3 and step 4 in this procedure to configure the 802.11a radio.
When a SonicPoint unit is first connected and powered up, it will have a factory default
configuration (IP address 192.168.1.20, username: admin, password: password). Upon initializing, it will attempt to find a SonicOS device with which to peer. If it is unable to find a peer SonicOS device, it will enter into a stand-alone mode of operation with a separate stand-alone configuration allowing it to operate as a standard Access Point.
If the SonicPoint does locate, or is located by a peer SonicOS device, via the SonicWALL
Discovery Protocol, an encrypted exchange between the two units will ensue wherein the profile assigned to the relevant Wireless zone will be used to automatically configure (provision) the newly added SonicPoint unit.
As part of the provisioning process, SonicOS will assign the discovered SonicPoint device a
unique name, and it will record its MAC address and the interface and zone on which it was discovered. It can also automatically assign the SonicPoint an IP address, if so configured, so that the SonicPoint can communicate with an authentication server for WPA-EAP support. SonicOS will then use the profile associated with the relevant zone to configure the 2.4GHz and 5GHz radio settings.
Modifications to profiles will not affect units that have already been provisioned and are in an
operational state. Configuration changes to operational SonicPoint devices can occur in two ways:
|
•
|
Via manual configuration changes
– Appropriate when a single, or a small set of changes are to be affected, particularly when that individual SonicPoint requires settings that are different from the profile assigned to its zone.
|
|
•
|
Via un-provisioning
– Deleting a SonicPoint unit effectively un-provisions the unit, or clears its configuration and places it into a state where it will automatically engage the provisioning process anew with its peer SonicOS device. This technique is useful when the profile for a zone is updated or changed, and the change is set for propagation. It can be used to update firmware on SonicPoints, or to simply and automatically update multiple SonicPoint units in a controlled
fashion, rather than changing all peered SonicPoints at once, which can cause service disruptions.
|
You can change the settings of any individual SonicPoint list on the
Sonicpoint > SonicPoints
page.
To edit the settings of an individual SonicPoint:
Step 3
|
Click
OK
to apply these settings.
|
Click
Synchronize SonicPoints
at the top of the SonicPoint
>
SonicPoints
page to update the settings for each SonicPoint reported on the page. When you click Synchronize
SonicPoints
, SonicOS polls all connected SonicPoints and displays updated settings on the page.
You can enable or disable individual SonicPoints on the
SonicPoint
>
SonicPoints
page:
Step 2
|
Click
Accept
at the top of the SonicPoint
>
SonicPoints
page to apply this setting to the SonicPoint.
|
Not all SonicOS Enhanced firmware contains an image of the SonicPoint firmware. To check,
scroll to the bottom of the SonicPoint > SonicPoints
page and look for the Download
link.
If your SonicWALL appliance has Internet connectivity, it will automatically download the
correct version of the SonicPoint image from the SonicWALL server when you connect a SonicPoint device.
If your SonicWALL appliance does
not
have Internet access, or has access only through a proxy server, you must perform the following steps:
You can download the SonicPoint image from one of the following locations:
You can change the file name of the SonicPoint image, but you should keep the extension
in tact (ex: .bin.sig).
Step 4
|
In the
System > Administration
screen, under Download URL, click the Manually specify
SonicPoint image URL
checkbox to enable it.
|
The SonicWALL Discovery Protocol (SDP) is a layer 2 protocol employed by SonicPoints and
devices running SonicOS Enhanced. SDP is the foundation for the automatic provisioning of SonicPoint units via the following messages:
|
•
|
Advertisement
– SonicPoint devices without a peer will periodically and on startup announce or advertise themselves via a broadcast. The advertisement will include information that will be used by the receiving SonicOS device to ascertain the state of the SonicPoint. The SonicOS device will then report the state of all peered SonicPoints, and will take configuration actions as needed.
|
|
•
|
Discovery
– SonicOS devices will periodically send discovery request broadcasts to elicit responses from L2 connected SonicPoint units.
|
|
•
|
Configure Directive
– A unicast message from a SonicOS device to a specific SonicPoint unit to establish encryption keys for provisioning, and to set the parameters for and to engage configuration mode.
|
|
•
|
Configure Acknowledgement
– A unicast message from a SonicPoint to its peered SonicOS device acknowledging a Configure Directive.
|
|
•
|
Keepalive
– A unicast message from a SonicPoint to its peered SonicOS device used to validate the state of the SonicPoint.
|
If via the SDP exchange the SonicOS device ascertains that the SonicPoint requires
provisioning or a configuration update (e.g. on calculating a checksum mismatch, or when a firmware update is available), the Configure directive will engage a 3DES encrypted, reliable TCP based SonicWALL Simple Provisioning Protocol (SSPP) channel. The SonicOS device will then send the update to the SonicPoint via this channel, and the SonicPoint will restart with the updated configuration. State information will be provided by the SonicPoint, and will be viewable on the SonicOS device throughout the entire discovery and provisioning process.
SonicPoint and SonicPointN devices can function in and report the following states (in all states
listed below, SonicPoint
refers to both SonicPoint and SonicPointN devices):
|
•
|
Initializing
– The state when a SonicPoint starts up and advertises itself via SDP prior to it entering into an operational or stand-alone mode.
|
|
•
|
Operational
– Once the SonicPoint has peered with a SonicOS device and has its configuration validated, it will enter into a operational state, and will be ready for clients.
|
|
•
|
Provisioning
– If the SonicPoint configuration requires an update, the SonicOS device will engage an SSPP channel to update the SonicPoint. During this brief process it will enter the provisioning state.
|
|
•
|
Safemode
– Safemode can be engaged by depressing the reset button, or from the SonicOS peer device. Placing a SonicPoint into Safemode returns its configuration to defaults, disables the radios, and disables SDP. The SonicPoint must then be rebooted to enter either a stand-alone, or some other functional state.
|
|
•
|
Non-Responsive
– If a SonicOS device loses communications with a previously peered SonicPoint, it will report its state as non-responsive. It will remain in this state until either communications are restored, or the SonicPoint is deleted from the SonicOS device’s table.
|
|
•
|
Updating Firmware
– If the SonicOS device detects that it has a firmware update available for a SonicPoint, it will use SSPP to update the SonicPoint’s firmware.
|
|
•
|
Downloading Firmware
– The SonicWALL appliance is downloading new SonicPoint firmware from the configured URL, which can be customized by the administrator. The default URL is http://software.sonicwall.com.
|
|
•
|
Downloading Failed
– The SonicWALL appliance cannot download the SonicPoint firmware from the configured URL.
|
|
•
|
Writing Firmware
– While the SonicPoint is writing new firmware to its flash, the progress is displayed as a percentage in the SonicOS management interface in the SonicPoint status field.
|
|
•
|
Over-Limit
– By default, up to 2 SonicPoint devices can be attached to the Wireless zone interface. If more than 2 units are detected, the over-limit devices will report an over-limit state, and will not enter an operational mode. The number can be reduced from 2 as needed.
|
|
•
|
Rebooting
– After a firmware or configuration update, the SonicPoint will announce that it is about to reboot, and will then do so.
|
|
•
|
Firmware failed
– If a firmware update fails, the SonicPoint will report the failure, and will then reboot.
|
|
•
|
Provision failed
– In the unlikely event that a provision attempt from a SonicOS device fails, the SonicPoint will report the failure. So as not to enter into an endless loop, it can then be manually rebooted, manually reconfigured, or deleted and re-provisioned.
|
|
•
|
Stand-alone Mode (not reported)
– If a SonicPoint device cannot find or be found by a SonicOS device to peer with, it will enter a stand-alone mode of operation. This will engage the SonicPoint’s internal GUI (which is otherwise disabled) and will allow it to be configured as a conventional Access Point. If at any time it is placed on the same layer 2 segment as a SonicOS device that is sending Discovery packets, it will leave stand-alone mode, and will enter into a managed mode. The stand-alone configuration will be retained.
|
This section provides SonicWALL recommendations and best practices regarding the design,
installation, deployment, and configuration issues for SonicWALL’s SonicPoint wireless access points. The information covered allows site administrators to properly deploy SonicPoints in environments of any size. This section also covers related external issues that are required for successful operation and deployment.
SonicWALL cannot provide any direct technical support for any of the third-party Ethernet
switches referenced in this section. The material is also subject to change without SonicWALL’s knowledge when the switch manufacturer releases new models or firmware that may invalidate the information contained here. The only exception to this rule is Hewlett-Packard, as SonicWALL is currently a member of HP’s ProCurve Alliance program, and works closely with HP to ensure compatibility with the ProCurve switch product line.
Further information on this can be found at:
http://h20195.www2.hp.com/v2/GetPDF.aspx/4AA1-9147ENUC.pdf
Best practices information is provided in the following sections:
The following are required for a successful SonicPoint deployment:
http://www.sonicwall.com/downloads/SonicWALL_PoE_Injector_Users_Guide.pdf
SonicWALL uses two proprietary protocols (SDP and SSPP) and both *cannot* be routed
across any layer 3 device. Any SonicPoint that will be deployed must have an Ethernet connection back to the provisioning SonicWALL UTM appliance, in the same broadcast domain/network.
The SonicWALL UTM appliance must have an interface or sub-interface in same VLAN/
broadcast domain as SonicPoint.
SonicPoints must be able to reach the DHCP scope on the SonicWALL; make sure other DHCP
servers are not present on the VLAN/broadcast domain.
Sharing SSIDs across SonicPoints attached to multiple interfaces may cause connectivity
issues as a wireless client roams to a different SonicPoint subnet.
|
•
|
Dell
– make sure to configure STP for fast start on SonicPoint ports.
|
|
•
|
Extreme
– make sure to configure STP for fast start on SonicPoint ports.
|
|
•
|
Foundry
– make sure to configure STP for fast start on SonicPoint ports.
|
|
•
|
HP ProCurve
– make sure to configure STP for fast start on SonicPoint ports.
|
|
•
|
Blueprints of floor plans are helpful; here you can mark the position of Access Points and
the range of the wireless cell. Make multiple copies of these as during the site-survey results may cause the original design not to be the best and a new start will be needed. As well you see where walls, halls and elevators are located, that can influence the signal. Also, areas in which users are located – and where not - can be seen. During the site-survey keep an eye open for electrical equipment that may cause interference (microwaves, CAT Scan equipment, etc…) In area’s were a lot of electrical equipment is placed, also take a look at the cabling being used. In areas with a lot of electrical equipment UTP should not be used, FTP or STP is required.
|
|
•
|
Plan accordingly for roaming users
– this will require tuning the power on each SonicPoint so that the signal overlap is minimal. Multiple SonicPoints broadcasting the same SSID in areas with significant overlap can cause ongoing client connectivity issues.
|
The default setting of SonicPoints is auto-channel. When this is set, at boot-up the SP will do
a scan and check if there are other wireless devices are transmitting. Then it will try to find an unused channel and use this for transmission. Especially in larger deployments, this can cause trouble. Here it is recommended to assign fixed channels to each SonicPoint. A diagram of the SPs and their MAC-Addresses helps to avoid overlaps, best is to mark the location of the SPs and MAC Addresses on a floor-plan.
If you are experiencing connectivity issues with laptops, check to see if the laptop has an Intel
embedded wireless adapter. The following Intel chipsets are publicly known and acknowledged by Intel to have disconnect issues with third-party wireless access points such as the SonicWALL SonicPoint and SonicPoint-G:
These wireless cards are provided to OEM laptop manufacturers and are often rebranded
under the manufacturers name – for example, both Dell and IBM use the above wireless cards but the drivers are branded under their own name.
To identify the adapter, go to Intel’s support site and do a search for
Intel Network Connection
ID Tool
. Install and run this tool on any laptop experiencing frequent wireless disconnect issues. The tool will identify which Intel adapter is installed inside the laptop.
Once you have identified the Intel wireless adapter, go to Intel’s support site and download the
newest software package for that adapter – it is recommended that you download and install the full Intel PRO/Set package and allow it to manage the wireless card, instead of Windows or any OEM provided wireless network card management program previously used. SonicWALL recommends that you use version 10.5.2.0 or newer of the full Intel PRO/Set Wireless software driver/manager.
Be sure to use the Intel wireless management utility and to disable Microsoft’s Wireless Zero
Config management service – the Intel utility should control the card, not the OS.
In the ‘Advanced’ section, disable the power management by unchecking the box next to ‘Use
default value’, then move the slidebar under it to ‘Highest’. This instructs the wireless card to operate at full strength and not go into sleep mode. When you are done, click on the ‘OK’ button to save and activate the change. Reboot the laptop.
In the ‘Advanced’ section, adjust the roaming aggressiveness by unchecking the box next to
‘Use default value’, then move the slidebar under it to ‘Lowest’. This instructs the wireless card to stay stuck to the AP it’s associated as long as possible, and only roam if the signal is significantly degraded. This is extremely helpful in environments with large numbers of access points broadcasting the same SSID. When you are done, click on the ‘OK’ button to save and activate the change. Reboot the laptop.
If you continue to have issues, you may also try adjusting the Preamble Mode on the wireless
card. By default the Intel wireless cards above are set to ‘auto’. All SonicWALL wireless products by default are set to use a ‘Long’ preamble, although this can be adjusted in the Management GUI. To adjust the Intel wireless card’s preamble setting, go to the ‘Advanced’ section and uncheck the box next to ‘Use default value’, then select ‘Long Tx Preamble’ from the drop-down below it. When you are done, click on the ‘OK’ button to save and activate the change. Reboot the laptop.
|
•
|
When an Ethernet port becomes electrically active, most switches by default will activate
the spanning-tree protocol on the port to determine if there are loops in the network topology. During this detection period of 50-60 seconds the port does not pass any traffic – this feature is well-known to cause problems with SonicPoints. If you do not need spanning-tree, disable it globally on the switch, or disable it on each port connected to a SonicPoint device.
|
Turn these trunking protocols off on ports connected directly to SonicPoints, as they have been
known to cause issues with SonicPoints – especially the high-end Cisco Catalyst series switches.
|
•
|
LACP
– turn this off on the ports going to SonicPoints.
|
This feature is an issue on some switches, especially D-Link. Please disable on per port basis
if possible, if not disable globally.
If you have an older SonicPoint and it’s consistently port flapping, or doesn’t power up at all, or
is stuck reboot cycling, or reports in the GUI as stuck in provisioning, check to see if you are running a current version of firmware, and that the SonicWALL UTM appliance has public internet access. You may need to RMA for a newer SonicPoint.
The SonicPoint has a reset switch inside a small hole in the back of the unit, next to the console
port. You can reset the SonicPoint at any time by pressing the reset switch with a straightened paperclip, a tooth pick, or other small, straight object.
The reset button resets the configuration of the mode the SonicPoint is operating in to the
factory defaults. It does not reset the configuration for the other mode. Depending on the mode the SonicPoint is operating in, and the amount of time you press the reset button, the SonicPoint behaves in one of the following ways:
|
•
|
Press the reset button for
at least three seconds
, and less than eight seconds
with the SonicPoint operating in Managed Mode to reset the Managed Mode configuration to factory defaults and reboot the SonicPoint.
|
|
•
|
Press the reset button for
more than eight seconds
with the SonicPoint operating in Managed Mode to reset the Managed Mode configuration to factory defaults and reboot the SonicPoint in SafeMode.
|
|
•
|
Press the reset button for
at least three seconds
, and less than eight seconds
with the SonicPoint operating in Stand-Alone Mode to reset the Stand-Alone Mode configuration to factory defaults and reboot the SonicPoint.
|
|
•
|
Press the reset button for
more than eight seconds
with the SonicPoint operating in Stand-Alone Mode to reset the Stand-Alone Mode configuration to factory defaults and reboot the SonicPoint in SafeMode.
|
Any Cisco POE Switch:
On the connecting interface/port, issue the command ‘Power inline static 10000’.
1900-series switch have portfast enabled by default on the 10mbps ports and disabled on the
100 Mbps ports. If you are using the 100mbps ports to connect to a SonicWALL device, issue the command ‘spantree start-forwarding’, which will greatly reduce the time STP is performed on the interface/port.
The D-Link PoE switches do not have a CLI, so you will need to use their web GUI. Note that
D-Link recommends upgrading to Firmware Version 1.20.09 if you are using multicast in your environment.
Disable spanning-tree, broadcast storm control, LLDP and the Safeguard Engine on the switch
before adding SonicPoints to the switch, as all may impact their successful provisioning, configuration, and functionality.