User guide

vi
BreezeNET DS.11b User’s Guide
Verifying the TCP/IP Protocol Settings ..................................... 3-10
Configuration Scenarios ....................................................................... 3-12
Wired LAN Administrator Station ............................................. 3-12
Wireless LAN Administrator Station ......................................... 3-13
Uninstalling BreezeNET Software ....................................................... 3-15
Basic Network Configuration ..................................4-1
Introduction ........................................................................................... 4-2
Peer-to-Peer Workgroups .......................................................... 4-2
Infrastructure Networks ............................................................. 4-2
What you Need ........................................................................... 4-3
Configuring Infrastructure Networks .................................................... 4-4
Basic Configuration ..................................................................... 4-4
Monitoring Your BreezeNET Network .....................5-1
Introduction ........................................................................................... 5-2
BreezeNET Tools ....................................................................... 5-2
Using the Client Manager ...................................................................... 5-4
Monitoring Methods .................................................................... 5-4
Link Test Window ....................................................................... 5-5
Site Monitor Window .................................................................. 5-9
Using the AP Manager ......................................................................... 5-19
Monitoring Options ................................................................... 5-19
Optimizing Performance ..........................................6-1
Introduction ........................................................................................... 6-2
Eliminating Redundant Traffic ................................................................ 6-3
Protocol Filtering ......................................................................... 6-3
Designing High Capacity Networks ..................................................... 6-20
About the CSMA/CA Protocol .................................................. 6-20
Security ....................................................................7-1
Introduction ........................................................................................... 7-2
Securing Access to Wireless Data .......................................................... 7-3
Restrict Wireless Access to the Network ................................... 7-3
Wireless Data Encryption .................................................................... 7-10
Enabling WEP Encryption .......................................................... 7-10
Securing Base Station Setup ................................................................. 7-16
Read and Read/Write passwords ............................................... 7-16
SNMP IP Access List ................................................................. 7-17
Trap Host Alerts ....................................................................... 7-17
Advanced Security Maintenance .......................................................... 7-20