MSM7xx Controllers Configuration Guide v6.4.0
Wireless IP filter...............................................................................................................134
DHCP server........................................................................................................................134
DHCP relay agent.................................................................................................................135
VSC data flow......................................................................................................................135
Access control enabled.....................................................................................................136
Access control disabled....................................................................................................137
Using multiple VSCs..............................................................................................................138
About the default VSC...........................................................................................................139
Quality of service.................................................................................................................139
Priority mechanisms..........................................................................................................140
IP QoS profiles................................................................................................................141
Upstream DiffServ tagging................................................................................................142
Upstream/downstream traffic marking................................................................................142
QoS example..................................................................................................................143
Creating a new VSC.............................................................................................................144
Assigning a VSC to a group..................................................................................................144
8 Working with controlled APs....................................................................145
Key concepts.......................................................................................................................145
Plug and play installation..................................................................................................145
Automatic software updates..............................................................................................145
Centralized configuration management...............................................................................145
Manual provisioning........................................................................................................145
Secure management tunnel...............................................................................................145
AP authentication.............................................................................................................145
AP licensing....................................................................................................................146
Key controlled-mode events....................................................................................................146
Discovery of controllers by controlled APs................................................................................148
Discovery overview..........................................................................................................148
Discovery methods...........................................................................................................149
Discovery order...............................................................................................................150
Discovery recommendations..............................................................................................151
Discovery priority.............................................................................................................152
Discovery considerations...................................................................................................154
Monitoring the discovery process.......................................................................................154
Authentication of controlled APs..............................................................................................159
Building the AP authentication list......................................................................................160
Configuring APs...................................................................................................................162
Overview........................................................................................................................162
Inheritance......................................................................................................................163
Configuration strategy......................................................................................................164
Working with groups........................................................................................................164
Working with APs............................................................................................................165
Assigning egress VLANs to a group...................................................................................170
Assigning country settings to a group.................................................................................170
Provisioning APs...................................................................................................................171
Provisioning methods........................................................................................................171
Displaying the provisioning pages......................................................................................172
Provisioning connectivity...................................................................................................173
Provisioning discovery......................................................................................................175
Provisioning summary.......................................................................................................177
Provisioning example........................................................................................................177
AP survivability.....................................................................................................................178
VSC services...................................................................................................................178
Switch ports....................................................................................................................178
Contents 5










