Manual

Contents
6
WDS Guidelines ..........................................................................................................................................................176
Configuring WDS Settings ..................................................................................................................................................178
Example of Configuring a WDS Link ...........................................................................................................................181
Chapter 17: Maintenance and Monitoring .....................................................................................................................183
Monitoring Wired and Wireless LAN Settings.....................................................................................................................184
Viewing the Event Logs ......................................................................................................................................................186
Log Relay Host for Kernel Messages ..........................................................................................................................187
Setting Up the Log Relay Host .............................................................................................................................187
Enabling or Disabling the Log Relay Host............................................................................................................188
Events Log...................................................................................................................................................................188
Viewing the Transmit/Receive Statistics.............................................................................................................................190
Viewing the Associated Wireless Clients............................................................................................................................192
Link Integrity Monitoring ..............................................................................................................................................192
What is the Difference Between an Association and a Session? ................................................................................192
Viewing the Status of Neighboring Access Points ..............................................................................................................193
Viewing System Information ...............................................................................................................................................197
Setting the Administrator Password....................................................................................................................................199
Enabling the Network Time Protocol (NTP) Server ............................................................................................................202
Setting the HTTP Timeout ..................................................................................................................................................204
Rebooting the Access Point................................................................................................................................................205
Resetting the Configuration to Factory Defaults .................................................................................................................206
Upgrading the Firmware .....................................................................................................................................................207
Verifying the Firmware Upgrade..................................................................................................................................208
SNMP Firmware Upgrade...................................................................................................................................................209
Chapter 18: Backing Up and Restoring a Configuration ..............................................................................................211
Backing up the Configuration Settings for an Access Point................................................................................................212
Restoring Access Point Settings to a Previous Configuration ............................................................................................213
Appendix A: Management Software Default Settings ..................................................................................................215
Appendix B: Configuring Security on Wireless Clients ...............................................................................................217
Network Infrastructure and Choosing Between the Built-in or External Authentication Server...........................................219
I Want to Use the Built-in Authentication Server (EAP-PEAP) ....................................................................................219
I Want to Use an External RADIUS Server with EAP-TLS Certificates or EAP-PEAP................................................21
9
Make Sure the Wireless Client Software is Up to Date.......................................................................................................220
Accessing the Microsoft Windows Wireless Client Security Settings .................................................................................221
Configuring a Client to Access an Unsecure Network (Plain Text mode)....................................................................223
Configuring Static WEP Security on a Client ...............................................................................................................224
Connecting to the Wireless Network with a Static WEP Client.............................................................................226
Configuring IEEE 802.1x Security on a Client .............................................................................................................227
IEEE 802.1x Client Using EAP/PEAP ..................................................................................................................227
IEEE 802.1x Client Using EAP/TLS Certificate ....................................................................................................231
Configuring WPA/WPA2 Enterprise (RADIUS) Security on a Client...................................................................................236
WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP........................................................................................236
WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate .........................................................................241
Configuring WPA/WPA2 Personal (PSK) Security on a Client ...........................................................................................245
Configuring an External RADIUS Server to Recognize the AT-WA7400 Wireless Access Point .......................................248
Obtaining a TLS-EAP Certificate for a Client......................................................................................................................253
Appendix C: Troubleshooting ........................................................................................................................................259
Wireless Distribution System (WDS) Problems and Solutions ...........................................................................................260
Cluster Recovery ................................................................................................................................................................261
Reboot or Reset the Access Point...............................................................................................................................261
Stop Clustering and Reset Each Access Point in the Cluster.....................................................................
.................261
Appendix D: Command Line Interface (CLI) for Access Point Configuration ............................................................265
Comparison of Settings Configurable with the CLI and Web UI .........................................................................................266
Accessing the CLI for an Access Point...............................................................................................................................269
Telnet Connection to the Access Point........................................................................................................................269
SSH Connection to the Access Point ..........................................................................................................................270