Manual

Contents
4
Removing an Access Point from the Cluster .................................................................................................................49
Adding an Access Point to a Cluster .............................................................................................................................50
Navigating to Configuration Information for a Specific Access Point and Managing Standalone Access Points .................52
Navigating to an Access Point by Using its IP Address in a URL..................................................................................52
Configuring MAC Address Filtering.......................................................................................................................................53
MAC Filtering of Rogue Access Points .................................................................................................................................55
Chapter 4: Managing User Accounts ...............................................................................................................................57
Adding a User .......................................................................................................................................................................58
Editing a User Account .........................................................................................................................................................60
Enabling a User Account ...............................................................................................................................................60
Disabling a User Account ..............................................................................................................................................61
Removing a User Account.............................................................................................................................................61
Backing Up and Restoring a User Database ........................................................................................................................62
Backing Up the User Database .....................................................................................................................................62
Restoring a User Database from a Backup File ............................................................................................................63
Chapter 5: Session Monitoring .........................................................................................................................................65
Viewing Sessions Information...............................................................................................................................................66
Viewing Specific Session Information............................................................................................................................67
Sorting Session Information ..........................................................................................................................................68
Chapter 6: Channel Management .....................................................................................................................................69
Understanding Channel Management ..................................................................................................................................70
How it Works in a Nutshell.............................................................................................................................................70
Overlapping Channels ...................................................................................................................................................70
Example: A Network Before and After Channel Management.......................................................................................71
Displaying the Channel Management Settings .....................................................................................................................72
Configuring the Channel Management Settings ...................................................................................................................73
Stopping or Starting Automatic Channel Assignment....................................................................................................73
Viewing Current Channel Assignments and Setting Locks..........................................................................
..................73
Updating the Current Channel Settings Manually..........................................................................................................74
Viewing the Last Proposed Set of Changes ..................................................................................................................74
Configuring Advanced Settings (Customizing and Scheduling Channel Plans) ............................................................75
Chapter 7: Wireless Neighborhoods ................................................................................................................................79
Understanding Wireless Neighborhood Information .............................................................................................................80
Displaying the Wireless Neighborhood Information ..............................................................................................................81
Viewing Details of a Cluster Member....................................................................................................................................84
Chapter 8: Configuring Ethernet (Wired) Settings ..........................................................................................................87
Setting the DNS Name..........................................................................................................................................................88
Enabling or Disabling Guest Access.....................................................................................................................................90
Configuring an Internal LAN and a Guest Network........................................................................................................90
Enabling or Disabling Guest Access..............................................................................................................................90
Enabling or Disabling Virtual Wireless Networks on the Access Point ..........................................................................90
Enabling or Disabling Spanning Tree ...................................................................................................................................92
Configuring the Internal Interface Ethernet Settings.............................................................................................................93
Configuring the Guest Interface Settings..............................................................................................................................96
Chapter 9: Configuring the Wireless Settings ................................................................................................................97
Configuring 802.11d Regulatory Domain Support ................................................................................................................98
Configuring the Radio Interface ..........................................................................................................................................100
Configuring Internal Wireless LAN Settings........................................................................................................................102
Configuring the Guest Network Wireless Settings..............................................................................................................103
Chapter 10: Configuring Security ...................................................................................................................................105
Understanding Security Issues on Wireless Networks ......................................................................................................106
How Do I Know Which Security Mode to Use?............................................................................................................106
Comparison of Security Modes for Key Management, Authentication and Encryption Algorithms .............................107
When to Use Plain Text........................................................................................................................................107
When to Use Static WEP .....................................................................................................................................107
When to Use IEEE 802.1x....................................................................................................................................108