Technical data

© 2012 Meru Networks, Inc. Contents xiii
CLI Example - Create Guest User ID . . . . . . . . . . . . 177
Optionally Configure Pre-Authentication Captive Portal Bypass . . . . 178
Captive Portal With N+1. . . . . . . . . . . . . . . . . . 179
Troubleshooting Captive Portal . . . . . . . . . . . . . . . 179
Third-Party Captive Portal Solutions. . . . . . . . . . . . . . . 179
Configure Third-Party Captive Portal With the Web UI . . . . . . . 180
Configure Third-Party Captive Portal With the CLI . . . . . . . . 180
Configure a Radius Server for Captive Portal Authentication . . . . . . 181
Configure a Radius Server with Web UI for Captive Portal Authentication 181
Configure a Radius Server with CLI for Captive Portal Authentication . . 181
Chapter 11
Rogue AP Detection and Mitigation . . . . . . . . . . . . .183
Configuring Rogue AP Mitigation with Web UI . . . . . . . . . . . 185
Alter the List of Allowed APs with the Web UI . . . . . . . . . . 186
Alter the List of Blocked APs with the Web UI . . . . . . . . . . 186
Configure Scanning and Mitigation Settings with the Web UI . . . . . 187
Configuring Rogue AP Detection Using the CLI . . . . . . . . . . . 188
Configuring the AP Access and Block Lists with the CLI . . . . . . . 189
Rogue Mitigation Example . . . . . . . . . . . . . . . . . 190
Modifying Detection and Mitigation CLI Settings. . . . . . . . . . . 191
Changing the Number of Mitigating APs with the CLI . . . . . . . . 192
Changing the Scanning and Mitigation Settings with the CLI . . . . . 192
Changing the Minimum RSSI with the CLI . . . . . . . . . . . . 193
Rogue Mitigation Example . . . . . . . . . . . . . . . . 193
Modify Rogue Detection and Mitigation Settings with the CLI . . . . . 194
Changing the Number of Mitigating APs with the CLI. . . . . . . 195
Changing the Scanning and Mitigation Settings with the CLI . . . . 195
Changing the Minimum RSSI with the CLI . . . . . . . . . . . 196
Configure Rogue AP Mitigation with the Web UI . . . . . . . . . 196
Alter the List of Allowed APs with the Web UI . . . . . . . . . 196
Alter the List of Blocked APs with the Web UI . . . . . . . . . 197
Configure Scanning and Mitigation Settings with the Web UI . . . . 198
Troubleshooting Rogue Mitigation . . . . . . . . . . . . . . . 199
Chapter 12
Configuring VLANs . . . . . . . . . . . . . . . . . . . . .201
Configure and Deploy a VLAN . . . . . . . . . . . . . . . . . 201
Bridged APs in a VLAN . . . . . . . . . . . . . . . . . . . 202
Delete a VLAN . . . . . . . . . . . . . . . . . . . . . . 203
More About VLANs . . . . . . . . . . . . . . . . . . . . . 203
Chapter 13
Configuring Access Points . . . . . . . . . . . . . . . . . .205
How AP Discovery Works . . . . . . . . . . . . . . . . . . . 205
Add and Configure an AP with the Web UI. . . . . . . . . . . . . 206
Configure an AP’s Radios with the Web UI. . . . . . . . . . . . . 209
Add and Configure an AP with the CLI . . . . . . . . . . . . . . 211
Configure a Layer 3 AP with the CLI . . . . . . . . . . . . . 213