User's Manual
Table Of Contents
- XS-3900 User’s Guide
- Front Matter
- Table of Contents
- List of Figures
- Introduction
- Installing the XS-3900
- Installation Prerequisites
- Planning Your Installation
- Installation Workflow
- Unpacking the XS-3900
- Installing the XS-3900
- Powering Up the XS-3900
- Establishing Communication with the Array
- Performing the Express Setup Procedure
- The Web Management Interface
- Configuring the XS-3900
- Logging In
- Making Configuration Changes to the XS-3900
- Array Status
- Express Setup
- Network Interfaces
- IAP Interfaces
- SSID Management
- Security
- Users
- Services
- Software
- Tools
- Event Log
- The Command Line Interface
- Establishing a Secure Shell (SSH) Connection
- Basic Commands
- Command Modes
- Selecting Interfaces
- Command Line Keywords
- Interface Selection
- Interface Configuration
- Radio Configuration
- Beacon Information
- System Administration
- System Testing
- Security
- Station Timeouts
- SSID Configuration
- DNS Configuration
- NTP Configuration
- DHCP Configuration
- Syslog Configuration
- SNMP Configuration
- Filters
- Radius Configuration
- Reports
- Data Handling
- Data Clearance
- Show Information
- Remove Configuration
- Help
- Appendix A: Quick Reference Guide
- Appendix B: Technical Support
- Glossary of Terms
- Index
Wireless LAN Array
188 Appendix B: Technical Support
Security
Q. How do I know my management session is secure?
A. Follow these guidelines:
z Administrator passwords
Always change the default administrator password (the default
is admin), and choose a strong replacement password. When
appropriate, issue read only administrator accounts.
z SSH versus Telnet
Be aware that Telnet is not secure over network connections and
should be used only with a direct serial port connection. When
connecting to the unit’s Command Line Interface over a network
connection, you must use a Secure SHell (SSH) utility. The most
commonly used freeware providing SSH tools is PuTTY.
z Configuration auditing
Do not change approved configuration settings. The optional
Xirrus Wireless Management System (XM-3300) offers powerful
management features for small or large XS-3900 deployments,
and can audit your configuration settings automatically. In
addition, using the XM-3300 eliminates the need for an FTP
server.
Q. Which wireless data encryption method should I use?
A. Wireless data encryption prevents eavesdropping on data being
transmitted or received over the airwaves. The XS-3900 allows you to
establish the following data encryption configuration options:
z Open
This option offers no data encryption and is not recommended,
though you might choose this option if clients are required to use
a VPN connection through a secure SSH utility, like PuTTy.