User Guide
Page 37
...address for a gateway that can be used for host-name to the access point by the network DHCP server. (Default: Disabled) NOTE: If there is no DHCP server on another network segment, then you disable DHCP, then manually enter the IP address and subnet mask. Step 3 DHCP Client - ...can route traffic between these segments. Then enter the IP address for automatic IP configuration. If a management station exists on your network, then the access point will automatically start up with its default IP address, 169.254.2.1. 4 Security - Using the Setup Wizard 3 IP Configuration - Either enable or ...
...address for a gateway that can be used for host-name to the access point by the network DHCP server. (Default: Disabled) NOTE: If there is no DHCP server on another network segment, then you disable DHCP, then manually enter the IP address and subnet mask. Step 3 DHCP Client - ...can route traffic between these segments. Then enter the IP address for automatic IP configuration. If a management station exists on your network, then the access point will automatically start up with its default IP address, 169.254.2.1. 4 Security - Using the Setup Wizard 3 IP Configuration - Either enable or ...
User Guide
Page 38
...authentication, or "Shared Key" to perform authentication based on a shared key that has been distributed to encrypt transmissions passing between wireless clients and the access point. (Default: Disabled) Shared Key Setup - If you select "Shared Key" authentication, enable WEP, then configure the shared ...the same Key ID values to communicate with the access point. 3-10 NOTE: All wireless devices must be entered as alphanumeric characters or hexadecimal (0~9, A~F, e.g., D7 0A 9C 7F E5). (Default: 128 bit, hexadecimal key type) 64-Bit Manual Entry: The key can contain 10 hexadecimal digits, ...
...authentication, or "Shared Key" to perform authentication based on a shared key that has been distributed to encrypt transmissions passing between wireless clients and the access point. (Default: Disabled) Shared Key Setup - If you select "Shared Key" authentication, enable WEP, then configure the shared ...the same Key ID values to communicate with the access point. 3-10 NOTE: All wireless devices must be entered as alphanumeric characters or hexadecimal (0~9, A~F, e.g., D7 0A 9C 7F E5). (Default: 128 bit, hexadecimal key type) 64-Bit Manual Entry: The key can contain 10 hexadecimal digits, ...
User Guide
Page 43
... system clock via SNTP server or manual configuration Displays information about the access point and wireless clients Displays configuration settings for the basic system and the wireless interface Shows the wireless clients currently associated with the access point Shows log messages stored in memory Configures the IEEE 802.11a interface Configures common radio signal parameters and other settings for each...
... system clock via SNTP server or manual configuration Displays information about the access point and wireless clients Displays configuration settings for the basic system and the wireless interface Shows the wireless clients currently associated with the access point Shows log messages stored in memory Configures the IEEE 802.11a interface Configures common radio signal parameters and other settings for each...
User Guide
Page 46
... (Enable) - Otherwise, leave the address as all zeros (0.0.0.0). Primary and Secondary DNS Address: The IP address of the access point. Web Servers - Select this option to manually configure a static address for the access point. IP Address: The IP address of Domain Name Servers on the local subnet. Allows monitoring of the default gateway...
... (Enable) - Otherwise, leave the address as all zeros (0.0.0.0). Primary and Secondary DNS Address: The IP address of the access point. Web Servers - Select this option to manually configure a static address for the access point. IP Address: The IP address of Domain Name Servers on the local subnet. Allows monitoring of the default gateway...
User Guide
Page 50
... appropriate. Session keys are unique to each client and are also used to wireless clients. It also provides a mechanism for authentication. The access point can also enable broadcast key rotation, so the access point provides a dynamic broadcast key and changes it is the most important issue. ...to encrypt and correlate traffic passing between a specific client and the access point. The 802.1X standard uses the Extensible Authentication Protocol (EAP) to 802.1X authentication. A RADIUS server can be manually configured on the RADIUS server before configuring MAC address or 802.1X...
... appropriate. Session keys are unique to each client and are also used to wireless clients. It also provides a mechanism for authentication. The access point can also enable broadcast key rotation, so the access point provides a dynamic broadcast key and changes it is the most important issue. ...to encrypt and correlate traffic passing between a specific client and the access point. The 802.1X standard uses the Extensible Authentication Protocol (EAP) to 802.1X authentication. A RADIUS server can be manually configured on the RADIUS server before configuring MAC address or 802.1X...
User Guide
Page 58
... the protocol used to specified user targets. To communicate with the access point, the management station must first have an IP address and subnet mask, configured either manually or dynamically. These objects are sent to configure these devices for ...access point using SNMP v1 and v2c is maintained by community strings. This agent continuously monitors the status of variables, known as the traffic passing to the onboard agent using SNMP v3 provides additional security features that cover message integrity, authentication, and encryption; Access to and from wireless...
... the protocol used to specified user targets. To communicate with the access point, the management station must first have an IP address and subnet mask, configured either manually or dynamically. These objects are sent to configure these devices for ...access point using SNMP v1 and v2c is maintained by community strings. This agent continuously monitors the status of variables, known as the traffic passing to the onboard agent using SNMP v3 provides additional security features that cover message integrity, authentication, and encryption; Access to and from wireless...
User Guide
Page 75
... is set the system clock manually. To display a time corresponding to automatically adjust the system clock for radio signal characteristics and wireless security features. During this fails it attempts an update from standard time. Traffic to four virtual access point (VAP) interfaces numbered 1to ...modes, IEEE 802.11a only, 802.11b/g only, or a mixed 802.11a/b/g mode. However, most radio signal parameters apply to all four VAP interfaces. The access point can be segregated based on the time at the Earth's prime meridian, zero degrees longitude. Radio Interface ...
... is set the system clock manually. To display a time corresponding to automatically adjust the system clock for radio signal characteristics and wireless security features. During this fails it attempts an update from standard time. Traffic to four virtual access point (VAP) interfaces numbered 1to ...modes, IEEE 802.11a only, 802.11b/g only, or a mixed 802.11a/b/g mode. However, most radio signal parameters apply to all four VAP interfaces. The access point can be segregated based on the time at the Earth's prime meridian, zero degrees longitude. Radio Interface ...
User Guide
Page 89
... and the software support provided on all VAP interfaces. Table 5 Wireless Security Considerations Security Mechanism Client Support Implementation Considerations WEP Built-in support on wireless clients. Security SECURITY The access point is listed in the following security mechanisms: Wired Equivalent ...the nearest access point. Wireless clients with other methods for each virtual access point (VAP) interface. The security mechanisms that clients attempting to connect to all 802.11a • Provides only weak security and 802.11g devices • Requires manual key ...
... and the software support provided on all VAP interfaces. Table 5 Wireless Security Considerations Security Mechanism Client Support Implementation Considerations WEP Built-in support on wireless clients. Security SECURITY The access point is listed in the following security mechanisms: Wired Equivalent ...the nearest access point. Wireless clients with other methods for each virtual access point (VAP) interface. The security mechanisms that clients attempting to connect to all 802.11a • Provides only weak security and 802.11g devices • Requires manual key ...
User Guide
Page 90
... be configured independently to work with all types of encryption (WEP, TKIP, or AES) in the access point. Required RADIUS server support is indicated separately in the following table. Table 6 Security Considerations Client Security Combination Configuration Summarya ...-enabled system and network card driver (native support provided in Windows XP) • Provides robust security in small networks • Requires manual management of pre-shared key • Clients may require management of digital certificates for the interface key authentication) Authentication: Shared Key or ...
... be configured independently to work with all types of encryption (WEP, TKIP, or AES) in the access point. Required RADIUS server support is indicated separately in the following table. Table 6 Security Considerations Client Security Combination Configuration Summarya ...-enabled system and network card driver (native support provided in Windows XP) • Provides robust security in small networks • Requires manual management of pre-shared key • Clients may require management of digital certificates for the interface key authentication) Authentication: Shared Key or ...
User Guide
Page 92
... (see page 4-8). WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that want to the network, and encrypting data transmitted between wireless clients and the access point. b The configuration of an open system, be sure to use the network. WEP is not supported. Setting up for improved data encryption and... a basic level of network security. Unfortunately, WEP has been found to be seriously flawed and cannot be sure that the WEP shared keys are manually distributed to all clients that are the same for each client in the IEEE 802.11 standard for...
... (see page 4-8). WEP uses static shared keys (fixed-length hexadecimal or alphanumeric strings) that want to the network, and encrypting data transmitted between wireless clients and the access point. b The configuration of an open system, be sure to use the network. WEP is not supported. Setting up for improved data encryption and... a basic level of network security. Unfortunately, WEP has been found to be seriously flawed and cannot be sure that the WEP shared keys are manually distributed to all clients that are the same for each client in the IEEE 802.11 standard for...
User Guide
Page 97
...the ratification of the IEEE 802.11i wireless security standard. The PSK mode uses the same TKIP packet encryption and key management as WPA in the enterprise, providing a robust and manageable alternative for WEP clients. This enables the access point to a WEP key. The main ... integrity. The AES-CCMP encryption cipher is manually entered on the wired network. The global encryption key for the WEP clients through shared keys. When access is provided for multicast and broadcast traffic must be configured on the access point and all clients, therefore it restricts encryption...
...the ratification of the IEEE 802.11i wireless security standard. The PSK mode uses the same TKIP packet encryption and key management as WPA in the enterprise, providing a robust and manageable alternative for WEP clients. This enables the access point to a WEP key. The main ... integrity. The AES-CCMP encryption cipher is manually entered on the wired network. The global encryption key for the WEP clients through shared keys. When access is provided for multicast and broadcast traffic must be configured on the access point and all clients, therefore it restricts encryption...
User Guide
Page 139
...11a:Transmit Power set to end : Enterprise AP#configure Enter configuration commands, one or more time servers Accepts time from the specified time servers Manually sets the system date and time Sets the start and end dates for daylight savings time Mode GC GC GC GC Sets the time zone for the access point...57:18 Information: 802.11g:11g Radio Interface Enabled Mar 09 11:56:35 Information: 802.11a:11a Radio Interface Enabled Mar 09 11:55:52 Information: SSH task: Set SSH server port to configure SNTP and system clock settings on the access point. previous. continue to QUARTER Press ...
...11a:Transmit Power set to end : Enterprise AP#configure Enter configuration commands, one or more time servers Accepts time from the specified time servers Manually sets the system date and time Sets the start and end dates for daylight savings time Mode GC GC GC GC Sets the time zone for the access point...57:18 Information: 802.11g:11g Radio Interface Enabled Mar 09 11:56:35 Information: 802.11a:11a Radio Interface Enabled Mar 09 11:55:52 Information: SSH task: Set SSH server port to configure SNTP and system clock settings on the access point. previous. continue to QUARTER Press ...
User Guide
Page 201
...no form to specific subnets. • gateway - IP address • netmask - Network mask for the access point. IP address of four numbers, 0 to existing IP subnets. You can manually configure a specific IP address using the ip dhcp command. Using the Command Line Interface Related Commands show interface ...this command, or direct the device to obtain an address from a DHCP server using this device to gain management access over the network or to connect the access point to 255, separated by periods. Use the no ip address • ip-address - Anything outside this format...
...no form to specific subnets. • gateway - IP address • netmask - Network mask for the access point. IP address of four numbers, 0 to existing IP subnets. You can manually configure a specific IP address using the ip dhcp command. Using the Command Line Interface Related Commands show interface ...this command, or direct the device to obtain an address from a DHCP server using this device to gain management access over the network or to connect the access point to 255, separated by periods. Use the no ip address • ip-address - Anything outside this format...
User Guide
Page 202
The current IP address (i.e., default or manually configured address) will continue to obtain an address from a DHCP server. You can include the IP ...command. • When you use this command, the access point will be broadcast periodically by this device to gain management access over the network or to connect the access point to learn its IP address. (DHCP values can manually configure a specific IP address using the ip address command... effort to existing IP subnets. CHAPTER 5: COMMAND LINE INTERFACE ip dhcp This command enables the access point to restore the default IP address.
The current IP address (i.e., default or manually configured address) will continue to obtain an address from a DHCP server. You can include the IP ...command. • When you use this command, the access point will be broadcast periodically by this device to gain management access over the network or to connect the access point to learn its IP address. (DHCP values can manually configure a specific IP address using the ip address command... effort to existing IP subnets. CHAPTER 5: COMMAND LINE INTERFACE ip dhcp This command enables the access point to restore the default IP address.
User Guide
Page 210
...8226; channel - Manually sets the radio channel used by the access point to avoid having the channels interfere with each other, and at least five channels for turbo mode; Otherwise, the lowest channel is selected. You can deploy up to four access points in the same ...the same area for 802.11a (e.g., channels 36, 56, 149, 165) and three access points for 802.11b/g (e.g., channels 1, 6, 11). • For most wireless adapters, the channel for communications with wireless clients. CHAPTER 5: COMMAND LINE INTERFACE channel This command configures the radio channel through which it ...
...8226; channel - Manually sets the radio channel used by the access point to avoid having the channels interfere with each other, and at least five channels for turbo mode; Otherwise, the lowest channel is selected. You can deploy up to four access points in the same ...the same area for 802.11a (e.g., channels 36, 56, 149, 165) and three access points for 802.11b/g (e.g., channels 1, 6, 11). • For most wireless adapters, the channel for communications with wireless clients. CHAPTER 5: COMMAND LINE INTERFACE channel This command configures the radio channel through which it ...