EasyManua.ls Logo

Hirschmann BAT54-F - User Manual

Hirschmann BAT54-F
548 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
BAT54-Rail/F..
Release
7.54
06/08
Technical Support
HAC-Support@hirschmann.de
User Manual
Configuration
Dualband Industrial Wireless LAN Access Point/Client
BAT54-Rail, BAT54-Rail FCC,
BAT54-F, BAT54-F FCC, BAT54-F X2
BAT54-F X2 FCC

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Hirschmann BAT54-F and is the answer not in the manual?

Hirschmann BAT54-F Specifications

General IconGeneral
ModelBAT54-F
TypeWireless Access Point
Frequency Bands2.4 GHz, 5 GHz
Wireless StandardsIEEE 802.11a/b/g/n
Maximum Data Rate300 Mbps
Ethernet Ports2 x 10/100/1000 Mbps
Power over Ethernet (PoE)IEEE 802.3af
Operating Temperature-20°C to +60°C
Data Rate300 Mbps
Antenna Connectors2 x RP-SMA
HousingPlastic
Protection ClassIP30
Mounting OptionsWall
Power SupplyPoE

Summary

1 Preface

LCOS, the operating system of BAT devices

Describes the device-independent operating system LCOS, used by BAT routers and Access Points.

Validity

Specifies the applicability of the manual to specific firmware versions and models.

Security settings

Recommends configuring security settings like Firewall, encryption, and access protection.

2 System design

2.1 Introduction

Provides an abstract overview of BAT interfaces and LCOS modules.

3 Wireless LAN - WLAN

3.1 What is a Wireless LAN?

Introduces wireless network technology, applications, and capabilities of BAT Access Points.

3.1.1 Standardized radio transmission by IEEE

Explains IEEE 802.11 standards (802.11a, 802.11b, 802.11g) for radio transmission.

3.1.2 Operation modes of Wireless LANs and base stations

Details various operation modes like ad-hoc, infrastructure, client, and bridge.

3.2 Development of WLAN security

Explains WLAN security evolution from WEP to WPA/TKIP and 802.11i/AES standards.

3.3 Protecting the wireless network

Covers methods to protect wireless networks using encryption, ACLs, and background scanning.

3.4 Configuration of WLAN parameters

Details WLAN parameter configuration including security, general settings, and interfaces.

3.5 Extended WLAN protocol filters

Covers parameters for filtering data packets, redirect function, and DHCP address tracking.

3.6 Client mode

Explains basic and advanced configuration for client mode, including roaming settings.

3.7 IEEE 802.11 i for point-to-point connections in the WLAN

Details antenna alignment, configuration, security, and geometric dimensioning for P2P WLAN connections.

3.8 Establishing outdoor wireless networks

Covers geometrical layout, antenna power, and transmission path considerations for outdoor wireless links.

3.9 Bandwidth limits in the WLAN

Explains bandwidth limitations for WLAN clients in access point and client modes.

3.10 WLAN according to 802.11 h

Discusses WLAN standards including IEEE 802.11h, ETSI standards, and frequency ranges.

4 Configuration and management

4.1 Configuration tools and approaches

Outlines the three access methods (inband, outband, remote) for configuring BAT devices.

4.2 Configuration software

Describes configuration software like LANconfig, WEBconfig, SNMP, Telnet, and TFTP.

4.3 Searching and configuring devices

Explains how to find and configure devices, including serial interface hints and hardware handshake.

4.4 Configuration using different tools

Details how to use LANconfig, WEBconfig, Telnet, TFTP, SNMP, and SSH for device configuration.

4.5 Working with configuration files

Explains saving, restoring, and managing device configurations using files.

4.6 New firmware with Hirschmann FirmSafe

Guides on updating firmware safely using Hirschmann FirmSafe, including activation modes.

4.7 How to reset the device?

Explains how to reset the device to factory default settings using the Reset button.

4.8 Managing administrators rights

Covers setting up administrators, defining access rights, and managing user privileges.

4.9 Named loopback addresses

Explains configuring loopback addresses for ICMP polling, time servers, and SYSLOG clients.

5 LANtools network management

5.1 Switch UI language

Explains how to set the graphical user interface language for LANconfig and LANmonitor.

5.2 Project management with LANconfig

Details managing devices within projects, including user-specific settings and directory structures.

5.3 Scripting

Explains scripting for automating configuration tasks, including applications and file management.

5.4 Group configuration with LANconfig

Guides on creating group configurations using partial configuration files and folders.

5.5 Rollout Wizard

Explains the Rollout Wizard for on-site adjustments and configuring variables and actions.

5.6 Display functions in LANmonitor

Covers display functions in LANmonitor for monitoring device status, connections, and activities.

5.7 LANmonitor-know whats going on

Introduces LANmonitor for viewing router status, troubleshooting messages, and monitoring traffic.

5.8 Visualization of larger WLANs

Explains WLANmonitor for visualizing WLAN status, searching access points, and detecting rogue devices.

6 Diagnosis

6.1 Trace information-for advanced users

Explains using trace outputs to monitor internal processes and troubleshoot connection errors.

6.2 SYSLOG storage in the device

Discusses SYSLOG module for recording accesses and configuring SYSLOG clients.

6.3 The ping command

Explains the ping command for testing network connectivity and its syntax.

6.4 Monitoring the switch

Discusses monitoring data traffic between ports and the need to set ports to monitor mode.

6.5 Cable testing

Describes using the built-in cable tester to diagnose cabling defects and interpret results.

7 Security

7.1 Protection for the configuration

Covers essential parameters for data exchange security, including password protection and access rights.

7.2 The security checklist

Provides an overview of important security functions to ensure comprehensive configuration.

8 Firewall

8.1 Threat analysis

Identifies potential dangers from Internet connections and common attack vectors.

8.2 What is a Firewall?

Defines a Firewall and its types, explaining how it checks data packets and ensures network protection.

8.3 The BAT Firewall

Details BAT Firewall functions, special protocols, general settings, and rule configuration.

8.4 Intrusion Detection

Explains the Intrusion Detection System (IDS) for recognizing, repelling, and logging break-in attempts.

8.5 Denial of Service

Discusses DoS attacks and protective mechanisms, including SYN Flooding, Smurf, and Ping of Death.

9 Quality of Service

9.1 Why QoS?

Explains the objective of Quality of Service (QoS) in transferring data packets safely or with minimal delay.

9.2 Which data packets to prefer?

Details methods for signaling preferential data packet treatment using ToS and DiffServ fields.

9.3 The queue concept

Explains the queue concept for data packet management in transmission and receiving directions.

9.4 Reducing the packet length

Discusses limiting packet length to prioritize time-critical connections and compensate for performance issues.

9.5 QoS parameters for Voice over IP applications

Covers QoS configuration for VoIP, influencing voice quality through delay, packet loss, and jitter.

9.7 QoS configuration

Guides on configuring QoS by evaluating ToS/DiffServ fields, defining bandwidth, and adjusting transfer rates.

10 Virtual LANs (VLANs)

10.1 What is a Virtual LAN?

Defines Virtual LANs (VLANs) for segmenting large LANs using switches, improving bandwidth and administration.

10.2 This is how a VLAN works

Explains VLAN goals like shielding traffic and reducing broadcast traffic to logical units using frame tagging.

10.3 Configuration of VLANs

Outlines tasks for configuring BAT Router VLANs, including defining virtual LANs and interface handling.

10.4 Configurable VLAN Protocol ID

Explains setting the Ethernet2 type of VLAN tag ('tag value') for provider networks using special VLAN tagging IDs.

10.5 Configurable VLAN IDs

Details assigning different VLAN IDs to WLAN users via MAC addresses in the Access List.

10.6 VLAN tags on layer 2;3 in the Ethernet

Describes VLAN tags on layer 2/3, their priority, and processing based on packet direction.

10.7 VLAN tags for DSL interfaces

Explains using VLAN tags for DSL networks to differentiate logical networks on shared transmission media.

10.8 VLAN Q-in-Q tagging

Details VLAN Q-in-Q tagging for connecting multiple networks sharing a physical medium.

11 Routing and WAN connections

11.1 General information

Covers WAN connection applications, protocols used, and close cooperation with router modules.

11.2 IP routing

Explains IP router functionality between networks and the structure of the IP routing table.

11.3 Configuration of remote stations

Details configuring remote stations using peer lists and layer lists, including switching off SYN/ACK speedup.

11.4 IP masquerading

Explains IP masquerading for connecting LAN computers to the Internet, hiding internal IP addresses.

11.5 Demilitarized Zone (DMZ)

Defines DMZ as a network segment accessible from the Internet for offering services, shielded by a firewall.

11.6 Advanced Routing and Forwarding

Introduces Advanced Routing and Forwarding (ARF) for flexible definition of IP networks and interface assignments.

11.7 Changes in other services

Details various network services like DHCP, NetBIOS proxy, RIP, PPPoE servers, and load balancing.

11.8 Load balancing

Discusses combining multiple DSL connections to overcome communication bottlenecks.

11.9 N:N mapping

Explains Network Address Translation (NAT) for coupling networks with identical address ranges and resolving conflicts.

11.10 Establishing connection with PPP

Introduces the Point-to-Point Protocol (PPP) and its functions like password protection and callback.

11.11 DSL Connection with PPTP

Details DSL dial-in over PPTP, building tunnels, and configuration parameters.

11.12 Extended connection for flat rates-Keep-alive

Explains the Keep-alive function for maintaining connections, especially with flat rates.

11.13 Callback functions

Covers automatic callback via ISDN port, including Microsoft CBCP and PPP LCP extensions.

11.14 serial interface

Discusses serial interfaces for modem operation, system requirements, and installation.

11.15 Manual definition of the MTU

Explains manually defining MTU for remote sites to avoid data transfer speed problems due to packet fragmentation.

11.16 WAN RIP

Covers entering remote stations into the WAN RIP table for broadcasting routes across the WAN.

11.17 The rapid spanning tree protocol

Discusses STP and RSTP for intelligent path selection, loop avoidance, and configuring the protocol.

12 More services

12.1 Automatic IP address administration with DHCP

Explains DHCP for dynamically assigning IP addresses, DNS, and gateway information to network devices.

12.3 DNS

Explains the Domain Name Service (DNS) for associating names with IP addresses and filtering domain requests.

12.4 Accounting

Covers saving connection information and accounting data in snapshots for later evaluation.

12.5 The SYSLOG module

Discusses the SYSLOG module for recording accesses and keeping a history of activities.

12.6 Time server for the local net

Explains how BAT routers apply time information from NTP servers or ISDN for local network stations.

12.7 Scheduled Events

Introduces scheduled events for executing predefined commands at user-defined times.

12.8 PPPoE Servers

Explains PPPoE clients and servers for managing network access rights and services.

12.9 RADIUS

Explains RADIUS as a triple-A protocol for authentication, authorization, and accounting of network access.

12.10 Extensions to the RADIUS server

Discusses RADIUS server extensions, including new authentication methods and RADIUS forwarding.

12.11 RADSEC

Explains RADSEC as a secure protocol for RADIUS using TLS-encrypted tunnels.

13 Appendix

13.1 Error messages in LANmonitor

Lists general and VPN error messages encountered in LANmonitor for troubleshooting.

13.2 SNMP Traps

Details SNMP traps, including MIB2 traps, enterprise-specific traps, and WLAN traps.

13.3 Radio channels

Provides information on radio channels and frequency ranges for 2.4 GHz and 5 GHz bands.

13.4 RFCs supported

Lists supported RFCs related to network protocols like Routing Information Protocol, PPP, and IPsec.

13.5 Glossary

Provides a glossary of terms related to wireless LAN, networking, and protocols.

Related product manuals