User's Manual
Table Of Contents
- Strix Systems Access/One Network User Guide
Table of Contents
INTRODUCTION....................................1
INSTALLATION.....................................2
ASSEMBLY AND SELF IDENTIFICATION...2
MANAGER/ONE..........................................2
HOST NETWORK REQUIREMENTS ...........9
USER SECURITY CONSIDERATIONS .......11
MANAGEMENT ...................................13
LOAD IMAGE ...........................................16
REBOOT NETWORK ................................17
UPDATE NAMES.......................................17
UPDATE MEMBERSHIP............................18
RENAME NETWORK................................18
VIEW ACTION STATUS............................18
NODE STATUS..........................................20
CONFIGURATION...............................22
SYSTEM CONFIGURATION ......................22
STATIC NETWORK SERVERS ..................23
WIFI.........................................................24
ADVANCED WIFI.....................................26
FIRMWARE FTP.......................................29
SECURITY.............................................30
WIFI SECURITY.......................................30
WIRELESS UPLINK (NETWORK
CONNECT) SECURITY .............................32
WIFI ACL ...............................................33
INVENTORY .........................................35
APPLY CONFIGURATION.................35
APPENDIX 1: MODULE / DEVICE
MANAGEMENT...................................36
DEVICE....................................................36
CONFIGURE............................................. 37
SECURITY................................................40
MONITOR ................................................ 41
APPENDIX 2: SPECIFICATIONS .....43
PHYSICAL ATTRIBUTES .........................43
EMISSIONS AND SAFETY STANDARDS ...43
USER COVERAGE RANGES FOR 802.11A,
802.11
B, & 802.11G ................................ 44
APPENDIX 3: CLI COMMANDS....... 45
APPENDIX 4: FREQUENTLY ASKED
QUESTIONS.......................................... 51
NETWORK ELEMENTS............................ 51
PRODUCT ASSEMBLY AND SETUP.......... 52
PRODUCT PERFORMANCE...................... 53
SYSTEM SOFTWARE AND OPERATION .. 53
SECURITY................................................54
SYSTEM MANAGEMENT ......................... 55
INSTALLATION CONSIDERATIONS......... 56
APPENDIX 5: SECURITY OVERVIEW
................................................................. 58
AUTHENTICATION .................................. 59
VARIATIONS ON THE EAP THEME ........... 60
ENCRYPTION........................................... 61
SOME ATTACK TYPES............................ 62
SECURITY DEVICES................................ 62
IEEE 802.11I .......................................... 62
WI-FI AND WPA REQUIREMENTS .........63
GLOSSARY ........................................... 64