Concept Guide
Table Of Contents
- About this Guide
- About Instant
- Setting up a W-IAP
- Automatic Retrieval of Configuration
- Instant User Interface
- Initial Configuration Tasks
- Customizing W-IAP Settings
- Modifying the W-IAP Host Name
- Configuring Zone Settings on a W-IAP
- Specifying a Method for Obtaining IP Address
- Configuring External Antenna
- Configuring Radio Profiles for a W-IAP
- Configuring Uplink VLAN for a W-IAP
- Changing the W-IAP Installation Mode
- Changing USB Port Status
- Master Election and Virtual Controller
- Adding a W-IAP to the Network
- Removing a W-IAP from the Network
- VLAN Configuration
- IPv6 Support
- Wireless Network Profiles
- Configuring Wireless Network Profiles
- Configuring Fast Roaming for Wireless Clients
- Configuring Modulation Rates on a WLAN SSID
- Multi-User-MIMO
- Management Frame Protection
- Disabling Short Preamble for Wireless Client
- Editing Status of a WLAN SSID Profile
- Editing a WLAN SSID Profile
- Deleting a WLAN SSID Profile
- Wired Profiles
- Captive Portal for Guest Access
- Understanding Captive Portal
- Configuring a WLAN SSID for Guest Access
- Configuring Wired Profile for Guest Access
- Configuring Internal Captive Portal for Guest Network
- Configuring External Captive Portal for a Guest Network
- Configuring Facebook Login
- Configuring Guest Logon Role and Access Rules for Guest Users
- Configuring Captive Portal Roles for an SSID
- Configuring Walled Garden Access
- Authentication and User Management
- Managing W-IAP Users
- Supported Authentication Methods
- Supported EAP Authentication Frameworks
- Configuring Authentication Servers
- Understanding Encryption Types
- Configuring Authentication Survivability
- Configuring 802.1X Authentication for a Network Profile
- Enabling 802.1X Supplicant Support
- Configuring MAC Authentication for a Network Profile
- Configuring MAC Authentication with 802.1X Authentication
- Configuring MAC Authentication with Captive Portal Authentication
- Configuring WISPr Authentication
- Blacklisting Clients
- Uploading Certificates
- Roles and Policies
- DHCP Configuration
- Configuring Time-Based Services
- Dynamic DNS Registration
- VPN Configuration
- IAP-VPN Deployment
- Adaptive Radio Management
- Deep Packet Inspection and Application Visibility
- Voice and Video
- Services
- Configuring AirGroup
- Configuring a W-IAP for RTLS Support
- Configuring a W-IAP for Analytics and Location Engine Support
- Managing BLE Beacons
- Clarity Live
- Configuring OpenDNS Credentials
- Integrating a W-IAP with Palo Alto Networks Firewall
- Integrating a W-IAP with an XML API Interface
- CALEA Integration and Lawful Intercept Compliance
- Cluster Security
- W-IAP Management and Monitoring
- Uplink Configuration
- Intrusion Detection
- Mesh W-IAP Configuration
- Mobility and Client Management
- Spectrum Monitor
- W-IAP Maintenance
- Monitoring Devices and Logs
- Hotspot Profiles
- ClearPass Guest Setup
- IAP-VPN Deployment Scenarios
- Acronyms and Abbreviations
111 | Wired Profiles Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide
Enabling Static LACP Configuration
When W-IAPs connect to switches which have the LACP capability, the LACP feature does not work as expected.
To enable a static LACP configuration, new commands are introduced.
W-IAPs support the dynamic LACP configuration according to a peer switch. When the peer switch enables
LACP configuration, the W-IAPs form the LACP. Users can enable, disable, and remove the static LACP
configuration in the W-IAP. When the W-IAP boots up, it forms the LACP according to the static configuration.
The static LACP mode is supported on W-IAP225, W-IAP275,and W-IAP325 access points.
To enable the static LACP mode on W-IAPs:
(Instant AP)# lacp-mode enable
To disable the static LACP mode on W-IAPs:
(Instant AP)# lacp-mode disable
Verifying Static LACP Mode
To verify the static LACP configuration, execute the following command in the W-IAP CLI:
(Instant AP)# show ap-env
Antenna Type:Internal
name:TechPubsAP
per_ap_ssid:1234
per_ap_vlan:abc
lacp_mode:enable
Understanding Hierarchical Deployment
AW-IAP with more than one wired port) can be connected to the downlink wired port of another W-IAP
(Ethernet X). AW-IAP with a single Ethernet port (like W-IAP90 or W-IAP100 Series access points) can be
provisioned to use Ethernet bridging, so that Ethernet 0 port is converted to a downlink wired port.
You can also form aW-IAP network by connecting the downlink port of a W-IAP to other W-IAPs. Only one W-
IAP in the network uses its downlink port to connect to the other W-IAPs. This W-IAP (called the root W-IAP)
acts as the wired device for the network, provides DHCP service and an L3 connection to the ISP uplink with
NAT. The root W-IAP is always the master of the Instant network. In a single Ethernet port platform
deployment, the root W-IAP must be configured to use the 3G uplink.
A typical hierarchical deployment consists of the following:
l A direct wired ISP connection or a wireless uplink.
l One or more DHCP pools for private VLANs.
l One downlink port configured on a private VLAN without authentication for connecting to slave W-IAPs.
Ensure that the downlink port configured in a private VLAN is not used for any wired client connection.
Other downlink ports can be used for connecting to the wired clients.
The following figure illustrates a hierarchical deployment scenario: