MSM7xx Controllers Configuration Guide v6.4.0

NAT security and static mappings........................................................................................63
VPN One-to-one NAT.........................................................................................................65
IP QoS..................................................................................................................................65
Configuring IP QoS profiles.................................................................................................65
Example...........................................................................................................................66
Customizing DiffServ DSCP mappings.......................................................................................68
IGMP proxy...........................................................................................................................68
5 Port trunking............................................................................................70
Deployment considerations......................................................................................................71
Static trunks......................................................................................................................72
Dynamic trunks..................................................................................................................72
Creating a static trunk.............................................................................................................72
Creating a dynamic trunk........................................................................................................75
6 Wireless configuration..............................................................................80
Wireless coverage..................................................................................................................80
Factors limiting wireless coverage........................................................................................80
Configuring overlapping wireless cells..................................................................................81
Automatic transmit power control.........................................................................................84
Supporting 802.11a and legacy wireless clients..........................................................................84
Radio configuration................................................................................................................85
Radio configuration parameters...........................................................................................87
Advanced wireless settings..................................................................................................96
Neighborhood scanning...................................................................................................101
Viewing wireless information..................................................................................................102
Viewing all wireless clients................................................................................................102
Viewing info for a specific wireless client.............................................................................103
Viewing wireless client data rates.......................................................................................103
Wireless access points......................................................................................................107
7 Working with VSCs................................................................................112
Key concepts.......................................................................................................................112
Binding VSCs to APs........................................................................................................112
Viewing and editing VSC profiles.......................................................................................112
The default VSC...............................................................................................................113
VSC configuration options.....................................................................................................113
About access control and authentication.............................................................................114
Summary of VSC configuration options...............................................................................116
Access control.................................................................................................................116
Virtual AP.......................................................................................................................117
VSC ingress mapping.......................................................................................................122
VSC egress mapping........................................................................................................123
Bandwidth control............................................................................................................123
Default user data rates......................................................................................................124
Wireless mobility.............................................................................................................124
Fast wireless roaming.......................................................................................................125
Wireless security filters......................................................................................................126
Wireless protection..........................................................................................................127
802.1X authentication.......................................................................................................130
RADIUS authentication realms...........................................................................................131
HTML-based user logins....................................................................................................132
VPN-based authentication.................................................................................................132
MAC-based authentication................................................................................................132
Location-aware................................................................................................................133
Wireless MAC filter..........................................................................................................133
4 Contents