User guide
Table Of Contents
- Contents
- About This Guide
- Introducing the ZoneFlex Access Point
- Overview of the ZoneFlex Access Point
- Unpacking the ZoneFlex Access Point
- Getting to Know the Access Point Features
- Installing the Access Point
- Before You Begin
- Step 1: Preconfigure the Access Point
- Configuring for Management by ZoneDirector
- Configuring for Standalone Operation or for Management by FlexMaster
- What You Will Need
- 1. Prepare the Administrative Computer
- 2. Connect the Access Point to the Administrative Computer
- 3. Log Into the Access Point’s Web Interface
- 4. Configure the Wireless Settings
- 5. Disconnect the Access Point from the Administrative Computer
- 6. Restore the Administrative Computer’s Network Settings
- Step 2: Verify Access Point Operation
- Step 3: Deploy the Access Point
- Troubleshooting Installation
- Navigating the Web Interface
- Configuring the Access Point
- Managing the Access Point
- Viewing Current Device Settings
- Viewing Current Internet Connection Settings
- Viewing Current Local Subnet Settings
- Viewing Current Wireless Settings
- Viewing Associated Wireless Clients
- Changing the Administrative Login Settings
- Enabling Other Management Access Options
- Working with Event Logs and Syslog Servers
- Upgrading the Firmware
- Rebooting the Access Point
- Resetting the Access Point to Factory Defaults
- Running Diagnostics
- Where to Find More Information
- Numerics
- A
- B
- C
- D
- E
- F
- G
- H
- I
- K
- L
- M
- N
- O
- P
- R
- S
- T
- U
- V
- W
- Z
- Index

87
Configuring the Access Point
Configuring Ethernet Ports
■ A single port can not be configured as both an Authenticator and Supplicant at
the same time.
■ Only one port per AP can be configured as a Supplicant.
■ If the AP is connecting to a switch port with 802.1X authentication enabled, the
AP’s port type should be configured as a Trunk Port and its role should be
configured as Supplicant. The switch port should be configured as a Trunk port in
Port-based Authenticator mode.
■ If there are multiple devices connected to an AP port (through a downstream
switch), the port can be configured as either Port-based or MAC-based Authen-
ticator. In Port-based mode, only one of the attached MAC hosts must be
authorized for all hosts to be granted access to the network. In MAC-based mode,
each MAC host is individually authenticated.
■ If a Trunk Port is configured as a Supplicant, a user name and password must be
entered to authenticate the port to the 802.1X aware LAN switch.
■ If an Access Port is configured as an Authenticator, the administrator must define
the RADIUS server that the Authenticator will communicate with. All Ethernet ports
of a single AP are configured with the same RADIUS server.
Enable MAC authentication bypass: If MAC authentication bypass is enabled, the
port first attempts to authenticate the attached device by MAC address, and if that
fails, it will try to authenticate the device using 802.1X.