Symbol Technologies 5000 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Symbol Technologies 5000, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Symbol Technologies 5000 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Symbol Technologies 5000. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Symbol Technologies 5000 should contain:
- informations concerning technical data of Symbol Technologies 5000
- name of the manufacturer and a year of construction of the Symbol Technologies 5000 item
- rules of operation, control and maintenance of the Symbol Technologies 5000 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Symbol Technologies 5000 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Symbol Technologies 5000, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Symbol Technologies service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Symbol Technologies 5000.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Symbol Technologies 5000 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Wireless Switch 5000 Quick Setup Guide WS 5000 Wireless Switch Version 1.1.4.30 72E-66722-01 Revision A December 2003 www.symbol.com[...]

  • Page 2

    Copyright Copyright © 2003 by Symbol Technologi es, Inc. A ll rights reserved. No part of this publication may be modified or adapted in any way, for any purposes witho ut permission in writing from Symbol Technologies, Inc. (Symbol). Th e material in this manual is subject to ch ange without notice. Symbol reserves the right to make changes to an[...]

  • Page 3

    Configuri ng the WS 5000 and Applying a WEP- 128 Policy Before using this quick set up guide, be sure to complete the tasks in the WS 5000 Wireless Switch Quick Install Guide (QIG). This document is written for t he network installer or administrator who is familiar with their Ethernet IP network but who is not necessarily trained on Symbol Technol[...]

  • Page 4

    Figure 2: The Network Topology Verifying the Connections If the WS 5000 is connected correctly, devices on the wireless LAN shoul d be able to connect to devices on the LAN. To test the connection betw een the wirele ss client device and the com puter shown in Figure 2, from the wireless client, enter: C:> ping xxx.xxx.xxx.yyy PING xxx.xxx.xxx.y[...]

  • Page 5

    S tep 2: Initial Configuration Using the CLI This step should take less than 10 minutes to co mplete. Note: In this guide, MAC and IP addresses have b een cha nged to protect actual devices from unauthorized access. To configure the WS 5000 with site-specific IP addressing a nd network policies, connect the administrative PC to the WS 5000 with the[...]

  • Page 6

    Configuring Ethernet Ports WS5000> config <enter> The system enters into the configuratio n mode and displays the following prompt: WS5000.(Cfg)> To change Ethernet port 2 configuration: WS5000.(Cfg)> Ethernet <enter> The system enters into Ethernet configur ation mode. To configure the Ethernet port parameters, enter the follo[...]

  • Page 7

    To verify information about an Ethernet port: WS5000.(Cfg)> show ethernet 2 <enter> The system displays inform ation about Ethernet port 2 (as oppo sed to port 1): WS5000.(Cfg)> show ethernet 2 Name : Ethernet 2 Network Interface Card # : 2 Description : Ethernet Adapter MAC Address : 00:A0:xx:xx:xx:xx Status : Enable Online : Yes Speed[...]

  • Page 8

    S tep 3: Creating a Policy Using the GUI This step should take less than 15 minutes to co mplete. When you finish this step, the WS 50 00 will be operating with a WEP 128 se curity policy. The WS 5000 GUI simplifies creating pol icies. To use the GUI, start a web browser on a computer connected like the computer on the wire d LAN in Figure 2. Direc[...]

  • Page 9

    These instructions apply to WS 5000s wi th the Typ e value set to Primary . If this WS 5000 is configured as Standby , no Access Ports will be adopted and n o policies will be applied. To change the Type setting: 1. From the toolbar, select System Setting s → Standby Manageme nt… 2. Click Primary for the Wireless Switch Mode selection . 3. Clic[...]

  • Page 10

    5. On the Wireless Switch P olicy screen, select the appropriate Country . The Channel and Power Level settings adjust to the country selected. Click Next to display available Access Port policies. 6. On this Wireless Switch Policy screen, click Create to define a new Access Port policy. The Create a New Access Port Policy Wizard screen appears. 7.[...]

  • Page 11

    8. On this Access Port Policy screen, click Create . The Create a New WLAN Wizard screen appears. olicy 9. On the Create a New WLAN Wi zard screen, enter a Name and (optional ) Description for this WLAN. For this example, the Name is QSG First WLAN and the Description is First Wireless LAN . Click Next to display the WLAN details screen. 10. Enter [...]

  • Page 12

    11. On this WLAN screen click Create to define a new security policy. The Create a New S ecurity Policy Wiz ard screen appears. 12. On the Create a New Security Policy Wizard screen, ente r a Name and (optional) Description for this new security policy. In this example, the Name is QSG First Security Policy and the Description is First securi ty po[...]

  • Page 13

    15. For wireless clients usi ng Symbol Technologies adapters, enter a Pass Key value and click Generate . Remember this Pass Key as it will be needed to configure wireless clients. Click Next and skip to step 17. 16. For wireless clients using non-Symb ol Technologies adapters, enter a 26 - character hexadecimal value for Key#1. Remember this 26-ch[...]

  • Page 14

    18. From the WLAN Wizar d screen, select the security policy just created. In this example, this is QSG First Security Policy . Click Next to display the next WLAN Wizard screen. 19. From this WLAN Wizard screen, clic k Next to display the WLAN creation confirmation screen. 20. From this WLAN Wizard confirmation screen, click Finish to save the WLA[...]

  • Page 15

    21. On the Access Port Policy Wizard screen, select the WLAN policy just created and click the >> button to move the policy from the Available box to the Selected box. The Access Port Policy W izard screen redisplays showing the WLAN policy in the Selected box. 22. From this Access Port Policy Wiz ard screen, click Next to apply the Network P[...]

  • Page 16

    24. Click Next without making any changes to the bandwidth setting s on this Access P ort Policy Wiz ard screen. The A ccess Port Policy confirmation screen appears. 25. On the Access Port Policy confirmation screen, click Finish to save this Access Port policy and exit the Access Port Policy Wizard. The Wireless Switch Policy Wizard screen appears[...]

  • Page 17

    27. From this Wire less Switch Policy Wizard screen, click Next to disp lay the Adoption List Allow screen. 28. Click Next without making any changes to this Wireless Switch Policy Wizard screen. Th e Adoption List Disallow screen appears. 29. Click Next without making any changes to this Wireless Switch Policy Wizard screen. Th e Unknown Access Po[...]

  • Page 18

    30. Click the Allow adoption and use Access Port Policy button and click Next to display the Wirele ss Switch Policy confirmation screen. 31. From this Wirele ss Switch Polic y confirmation scree n click Finish to save this Wireless Switch policy and exit the Wireless Switch Policy Wizard. The Wireless Switch Policy Manager screen appears. 32. From[...]

  • Page 19

    33. From the Warning box, click OK . The Wireless Swit ch Policy Manag er screen reappears. 34. From the Wireless Switch Policy Manager screen, click Close . The WS 5000 main screen reap pears. 35. Notice that the policy tree on the left panel of the WS 5000 main screen shows the new policy ( QSG Wireless Switch Policy ), which make s WEP 128 activ[...]

  • Page 20

    To verify that the new policy is working: 1. Reconfigure wireless clients to match th ese new settings (ESSID, etc.) as shown in Figure 2. 2. Reissue the ping test done in “Verifying the Conne ctions” to confirm that a wireless client can still reach the wired LAN. Or, use the GUI to confirm connectivity with mobile units. To verify the connect[...]