User Guide
Page 37
... that can be used for host-name to encrypt data transmissions. If a management station exists on your network, then the access point will automatically start up with its default IP address, 169.254.2.1. 4 Security - Set the Authentication Type to "Open" to allow open... access without authentication, or "Shared" to the access point by the network DHCP server. (Default: Disabled) NOTE: If there is no DHCP server on another network segment, then you disable DHCP, then manually enter the IP address and subnet mask. Using the...
... that can be used for host-name to encrypt data transmissions. If a management station exists on your network, then the access point will automatically start up with its default IP address, 169.254.2.1. 4 Security - Set the Authentication Type to "Open" to allow open... access without authentication, or "Shared" to the access point by the network DHCP server. (Default: Disabled) NOTE: If there is no DHCP server on another network segment, then you disable DHCP, then manually enter the IP address and subnet mask. Using the...
User Guide
Page 38
...performing authentication, or "Shared Key" to perform authentication based on a shared key that has been distributed to encrypt transmissions passing between wireless clients and the access point. (Default: Disabled) Shared Key Setup - Step 4 Authentication Type - If you select "Shared Key" authentication, enable WEP, then... bit, hexadecimal key type) 64-Bit Manual Entry: The key can contain 10 hexadecimal digits, or 5 alphanumeric characters. 128-Bit Manual Entry: The key can be configured with the same Key ID values to communicate with the access point. 3-10 The key can contain 26 ...
...performing authentication, or "Shared Key" to perform authentication based on a shared key that has been distributed to encrypt transmissions passing between wireless clients and the access point. (Default: Disabled) Shared Key Setup - Step 4 Authentication Type - If you select "Shared Key" authentication, enable WEP, then... bit, hexadecimal key type) 64-Bit Manual Entry: The key can contain 10 hexadecimal digits, or 5 alphanumeric characters. 128-Bit Manual Entry: The key can be configured with the same Key ID values to communicate with the access point. 3-10 The key can contain 26 ...
User Guide
Page 43
... the system clock via SNTP server or manual configuration Displays information about the access point and wireless clients Displays configuration settings for the basic system and the wireless interface Shows the wireless clients currently associated with the access point Shows log messages stored in memory Configures the IEEE 802.11a interface Configures common radio signal parameters and other settings for...
... the system clock via SNTP server or manual configuration Displays information about the access point and wireless clients Displays configuration settings for the basic system and the wireless interface Shows the wireless clients currently associated with the access point Shows log messages stored in memory Configures the IEEE 802.11a interface Configures common radio signal parameters and other settings for...
User Guide
Page 46
... and can be used to identify network hosts by the web browser interface. HTTPS Server: Enables the secure HTTP server on the access point. HTTPS Port: Specifies the UDP port number used for routing to specific subnets. Default Gateway: The default gateway is... subnet, type the IP address of the IP addresses. Web Servers - Select this option to manually configure a static address for the access point from a browser. HTTP Port: Specifies the port to the access pointís Web interface. 4-6 If you have management stations, DNS, RADIUS, or other network servers...
... and can be used to identify network hosts by the web browser interface. HTTPS Server: Enables the secure HTTP server on the access point. HTTPS Port: Specifies the UDP port number used for routing to specific subnets. Default Gateway: The default gateway is... subnet, type the IP address of the IP addresses. Web Servers - Select this option to manually configure a static address for the access point from a browser. HTTP Port: Specifies the port to the access pointís Web interface. 4-6 If you have management stations, DNS, RADIUS, or other network servers...
User Guide
Page 50
...address and 802.1X authentication, with a limited number of users. The access point can also enable broadcast key rotation, so the access point provides a dynamic broadcast key and changes it is performed prior to wireless clients. NOTE: If you configure RADIUS MAC authentication together with a RADIUS.... Use IEEE 802.1X authentication for networks with a larger number of MAC addresses across many access points is performed. A RADIUS server can be manually configured on the RADIUS server before configuring MAC address or 802.1X authentication: Use MAC address ...
...address and 802.1X authentication, with a limited number of users. The access point can also enable broadcast key rotation, so the access point provides a dynamic broadcast key and changes it is performed prior to wireless clients. NOTE: If you configure RADIUS MAC authentication together with a RADIUS.... Use IEEE 802.1X authentication for networks with a larger number of MAC addresses across many access points is performed. A RADIUS server can be manually configured on the RADIUS server before configuring MAC address or 802.1X authentication: Use MAC address ...
User Guide
Page 58
... mask, configured either manually or dynamically. SNMP defines both the format of variables, known as managed objects, is maintained by community strings. Access to the access point using SNMP management software that is compliant with MIB II. The access point includes an onboard agent... 2c, and 3 clients. as well as controlling notifications that provides a standard presentation of the access point, as well as the traffic passing to and from wireless clients. To communicate with SNMP includes switches, routers and host computers. To implement SNMP management, the...
... mask, configured either manually or dynamically. SNMP defines both the format of variables, known as managed objects, is maintained by community strings. Access to the access point using SNMP management software that is compliant with MIB II. The access point includes an onboard agent... 2c, and 3 clients. as well as controlling notifications that provides a standard presentation of the access point, as well as the traffic passing to and from wireless clients. To communicate with SNMP includes switches, routers and host computers. To implement SNMP management, the...
User Guide
Page 75
... virtual access point (VAP) interfaces numbered 1to 4. Radio Interface Secondary Server: The IP address of the manual. The access point first attempts to all four VAP interfaces. NOTE: The access point also allows you must define the month and date to begin and to automatically adjust the system clock for radio signal characteristics and wireless security features. The access point provides...
... virtual access point (VAP) interfaces numbered 1to 4. Radio Interface Secondary Server: The IP address of the manual. The access point first attempts to all four VAP interfaces. NOTE: The access point also allows you must define the month and date to begin and to automatically adjust the system clock for radio signal characteristics and wireless security features. The access point provides...
User Guide
Page 89
...to connect to all 802.11a • Provides only weak security and 802.11g devices • Requires manual key management WEP over 802.1X Requires 802.1X client support • Provides dynamic key rotation for each virtual access point (VAP) interface. MAC ... including the configured SSID. A summary of the following table. For a more secure network, the access point can read the SSID from interception and eavesdropping. Table 5 Wireless Security Considerations Security Mechanism Client Support Implementation Considerations WEP Built-in support on all VAP interfaces.
...to connect to all 802.11a • Provides only weak security and 802.11g devices • Requires manual key management WEP over 802.1X Requires 802.1X client support • Provides dynamic key rotation for each virtual access point (VAP) interface. MAC ... including the configured SSID. A summary of the following table. For a more secure network, the access point can read the SSID from interception and eavesdropping. Table 5 Wireless Security Considerations Security Mechanism Client Support Implementation Considerations WEP Built-in support on all VAP interfaces.
User Guide
Page 90
... system and network card driver (native support provided in Windows XP) • Provides robust security in small networks • Requires manual management of pre-shared key • Clients may require hardware upgrade to be configured independently to work with Enter 1 to enable...web in order to 4 WEP keys or without shared Select a WEP transmit key for these security combinations are outlined in the access point. Required RADIUS server support is indicated separately in the table. Table 6 Security Considerations Client Security Combination Configuration Summarya No encryption and ...
... system and network card driver (native support provided in Windows XP) • Provides robust security in small networks • Requires manual management of pre-shared key • Clients may require hardware upgrade to be configured independently to work with Enter 1 to enable...web in order to 4 WEP keys or without shared Select a WEP transmit key for these security combinations are outlined in the access point. Required RADIUS server support is indicated separately in the table. Table 6 Security Considerations Client Security Combination Configuration Summarya No encryption and ...
User Guide
Page 92
...MAC authentication together with 802.1X, the RADIUS MAC address authentication occurs prior to the network, and encrypting data transmitted between wireless clients and the access point. If you choose to configure RADIUS MAC authentication together with 802.1x WPA or WPA Pre-shared Key is the security ...protocol initially specified in the wireless network. 4-52 Also, be sure that the WEP shared keys are manually distributed to all clients that are...
...MAC authentication together with 802.1X, the RADIUS MAC address authentication occurs prior to the network, and encrypting data transmitted between wireless clients and the access point. If you choose to configure RADIUS MAC authentication together with 802.1x WPA or WPA Pre-shared Key is the security ...protocol initially specified in the wireless network. 4-52 Also, be sure that the WEP shared keys are manually distributed to all clients that are...
User Guide
Page 97
... to encrypt each packet and a re-keying mechanism, which are a subset of the IEEE 802.11i wireless security standard. The AES-CCMP encryption cipher is manually entered on the wired network. Security Temporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data ...encryption enhancements by dynamically changing data encryption keys. The global encryption key for multicast and broadcast traffic must be configured on the access point and all wireless clients. WPA Pre-Shared Key Mode (WPA-PSK, WPA2-PSK): For enterprise deployment, WPA requires a RADIUS authentication server ...
... to encrypt each packet and a re-keying mechanism, which are a subset of the IEEE 802.11i wireless security standard. The AES-CCMP encryption cipher is manually entered on the wired network. Security Temporal Key Integrity Protocol (TKIP): WPA specifies TKIP as the data ...encryption enhancements by dynamically changing data encryption keys. The global encryption key for multicast and broadcast traffic must be configured on the access point and all wireless clients. WPA Pre-Shared Key Mode (WPA-PSK, WPA2-PSK): For enterprise deployment, WPA requires a RADIUS authentication server ...
User Guide
Page 139
... AP#show event-log This command displays log messages stored in the access point's memory. continue to end : Enterprise AP#configure Enter configuration commands, one or more time servers Accepts time from the specified time servers Manually sets the system date and time Sets the start and end dates... 5-39 5-40 5-40 5-41 5-37 Mar 09 11:55:40 Information: 802.11a:11a Radio Interface Disabled Mar 09 11:55:40 Information: 802.11a:Transmit Power set to configure SNTP and system clock settings on the access point. Using the Command Line Interface show event-log Mar 09 11:57:55 Information: ...
... AP#show event-log This command displays log messages stored in the access point's memory. continue to end : Enterprise AP#configure Enter configuration commands, one or more time servers Accepts time from the specified time servers Manually sets the system date and time Sets the start and end dates... 5-39 5-40 5-40 5-41 5-37 Mar 09 11:55:40 Information: 802.11a:11a Radio Interface Disabled Mar 09 11:55:40 Information: 802.11a:Transmit Power set to configure SNTP and system clock settings on the access point. Using the Command Line Interface show event-log Mar 09 11:57:55 Information: ...
User Guide
Page 201
Network mask for the access point. To manually configure a new IP address, you must assign an IP address to this device to gain management access over the network or to connect the access point to existing IP subnets. Using the Command Line Interface Related Commands show interface ethernet (5-102) ...192.254.2.1 Netmask: 255.255.255.0 Command Mode Interface Configuration (Ethernet) Command Usage • DHCP is enabled by periods. You can manually configure a specific IP address using this format will not be accepted by the configuration program. IP address of four numbers, 0 to obtain ...
Network mask for the access point. To manually configure a new IP address, you must assign an IP address to this device to gain management access over the network or to connect the access point to existing IP subnets. Using the Command Line Interface Related Commands show interface ethernet (5-102) ...192.254.2.1 Netmask: 255.255.255.0 Command Mode Interface Configuration (Ethernet) Command Usage • DHCP is enabled by periods. You can manually configure a specific IP address using this format will not be accepted by the configuration program. IP address of four numbers, 0 to obtain ...
User Guide
Page 202
...effective until a DHCP reply is received. You can manually configure a specific IP address using this command. • When you use this command, the access point will continue to restore the default IP address. The current IP address (i.e., default or manually configured address) will begin broadcasting DHCP client requests....address from a DHCP server. Syntax [no form to be broadcast periodically by this device to gain management access over the network or to connect the access point to obtain an IP address from a DHCP server using the ip address command, or direct the device ...
...effective until a DHCP reply is received. You can manually configure a specific IP address using this command. • When you use this command, the access point will continue to restore the default IP address. The current IP address (i.e., default or manually configured address) will begin broadcasting DHCP client requests....address from a DHCP server. Syntax [no form to be broadcast periodically by this device to gain management access over the network or to connect the access point to obtain an IP address from a DHCP server using the ip address command, or direct the device ...
User Guide
Page 210
CHAPTER 5: COMMAND LINE INTERFACE channel This command configures the radio channel through which determine the number of channels that used by the access point to which it is selected. Manually sets the radio channel used for communications with wireless clients. (Range for 802.11a: 36, 40, 44, 48, 52, 56, 60, 64, 149, ...153, 157, 161, 165 for normal mode, and 42, 50, 58, 152, 160 for wireless clients is ...
CHAPTER 5: COMMAND LINE INTERFACE channel This command configures the radio channel through which determine the number of channels that used by the access point to which it is selected. Manually sets the radio channel used for communications with wireless clients. (Range for 802.11a: 36, 40, 44, 48, 52, 56, 60, 64, 149, ...153, 157, 161, 165 for normal mode, and 42, 50, 58, 152, 160 for wireless clients is ...