Specifications

BlueSecure™ Controller Setup and Administration Guide xv
About This Guide
The
BlueSecure™ Controller Setup and Administration Guide
provides
complete instructions for installing, powering up, configuring, and managing
the BlueSecure Controller. This section introduces the document and describes:
•Audience
Document Organization
Notational Conventions
Related Documentation
Terminology
Audience
The
BlueSecure™ Controller Setup and Administration Guide
is written for
network administrators who will physically install and power up the BlueSecure
Controller (BSC), and then use its HTML-based administrator interface to
configure the Controller for use in their network.
We assume our audience is knowledgeable of and has experience
administering switches, routers, or similar computer hardware.
Document Organization
The information in this guide is organized as follows:
•Chapter 1,
"An Overview of the BlueSecure Controller"
, describes
BlueSecure Controller features and functions and provides an overview of
how the Controller can be used to secure and manage 802.11 wireless
networks.
•Chapter 2,
"Installation"
, provides complete procedures for mounting the
BlueSecure Controller, connecting the Controller to your network, and
powering up the Controller.
•Chapter 3,
"Administrator Console"
, gives an overview of the BlueSecure
Controller’s HTML-based administrator console and its use to configure and
monitor a BlueSecure Controller.
•Chapter 4,
"Networks"
, discusses the BSC Protected Physical Interface, the
BSC Managed Interface, failover parameters, static routes, multicast
routing, and AppleTalk routing.
•Chapter 5,
"Authentication Using Internal Database"
, discusses using the
BSC's internal database for user authentication and authenticating and
assigning a role using media access control (MAC) addresses for wireless
devices do not support login via web browser. It also describes creating,
editing, and deleting local user accounts.
•Chapter 6,
"Authentication Using External Servers"
, discusses iPass client
authentication, RADIUS authentication, LDAP/active directory