Specifications
BlueSecure™ Controller Setup and Administration Guide xv
About This Guide
The
 BlueSecure™ Controller Setup and Administration Guide
 provides 
complete instructions for installing, powering up, configuring, and managing 
the BlueSecure Controller. This section introduces the document and describes:
•Audience
• Document Organization
• Notational Conventions
• Related Documentation
• Terminology
Audience
The 
BlueSecure™ Controller Setup and Administration Guide
 is written for 
network administrators who will physically install and power up the BlueSecure 
Controller (BSC), and then use its HTML-based administrator interface to 
configure the Controller for use in their network.
We assume our audience is knowledgeable of and has experience 
administering switches, routers, or similar computer hardware.
Document Organization
The information in this guide is organized as follows:
•Chapter 1, 
"An Overview of the BlueSecure Controller"
, describes 
BlueSecure Controller features and functions and provides an overview of 
how the Controller can be used to secure and manage 802.11 wireless 
networks.
•Chapter 2, 
"Installation"
, provides complete procedures for mounting the 
BlueSecure Controller, connecting the Controller to your network, and 
powering up the Controller.
•Chapter 3, 
"Administrator Console"
, gives an overview of the BlueSecure 
Controller’s HTML-based administrator console and its use to configure and 
monitor a BlueSecure Controller.
•Chapter 4, 
"Networks"
, discusses the BSC Protected Physical Interface, the 
BSC Managed Interface, failover parameters, static routes, multicast 
routing, and AppleTalk routing.
•Chapter 5, 
"Authentication Using Internal Database"
, discusses using the 
BSC's internal database for user authentication and authenticating and 
assigning a role using media access control (MAC) addresses for wireless 
devices do not support login via web browser. It also describes creating, 
editing, and deleting local user accounts.
•Chapter 6, 
"Authentication Using External Servers"
, discusses iPass client 
authentication, RADIUS authentication, LDAP/active directory 










