Concept Guide
Table Of Contents
- About this Guide
- About Instant
- Setting up a W-IAP
- Automatic Retrieval of Configuration
- Instant User Interface
- Initial Configuration Tasks
- Basic Configuration Tasks
- Additional Configuration Tasks
- Customizing W-IAP Settings
- Modifying the W-IAP Hostname
- Configuring Zone Settings on a W-IAP
- Specifying a Method for Obtaining IP Address
- Configuring External Antenna
- Configuring Radio Profiles for a W-IAP
- Configuring Uplink VLAN for a W-IAP
- Changing USB Port Status
- Master Election and Virtual Controller
- Adding a W-IAP to the Network
- Removing a W-IAP from the Network
- VLAN Configuration
- Wireless Network Profiles
- Configuring Wireless Network Profiles
- Configuring Fast Roaming for Wireless Clients
- Editing Status of a WLAN SSID Profile
- Editing a WLAN SSID Profile
- Deleting a WLAN SSID Profile
- Wired Profiles
- Configuring a Wired Profile
- Assigning a Profile to Ethernet Ports
- Editing a Wired Profile
- Deleting a Wired Profile
- Link Aggregation Control Protocol
- Understanding Hierarchical Deployment
- Captive Portal for Guest Access
- Understanding Captive Portal
- Configuring a WLAN SSID for Guest Access
- Configuring Wired Profile for Guest Access
- Configuring Internal Captive Portal for Guest Network
- wConfiguring External Captive Portal for a Guest Network
- Configuring Facebook Login
- Configuring Guest Logon Role and Access Rules for Guest Users
- Configuring Captive Portal Roles for an SSID
- Configuring Walled Garden Access
- Authentication and User Management
- Managing W-IAP Users
- Supported Authentication Methods
- Supported EAP Authentication Frameworks
- Configuring Authentication Servers
- Understanding Encryption Types
- Configuring Authentication Survivability
- Configuring 802.1X Authentication for a Network Profile
- Configuring MAC Authentication for a Network Profile
- FConfiguring MAC Authentication with 802.1X Authentication
- hConfiguring MAC Authentication with Captive Portal Authentication
- Configuring WISPr Authentication
- Blacklisting Clients
- Uploading Certificates
- Roles and Policies
- Firewall Policies
- Content Filtering
- Configuring User Roles
- Configuring Derivation Rules
- Using Advanced Expressions in Role and VLAN Derivation Rules
- DHCP Configuration
- VPN Configuration
- IAP-VPN Deployment
- Adaptive Radio Management
- Deep Packet Inspection and Application Visibility
- Voice and Video
- Services
- AirGroup Configuration
- Configuring a W-IAP for RTLS Support
- Configuring a W-IAP for Analytics and Location Engine Support
- Configuring OpenDNS Credentials
- Integrating a W-IAP with Palo Alto Networks Firewall
- Integrating a W-IAP with an XML API interface
- CALEA Integration and Lawful Intercept Compliance
- W-IAP Management and Monitoring
- Managing a W-IAP from W-AirWave
- Image Management
- Resetting a W-IAP
- W-IAP and Client Monitoring
- Template-based Configuration
- Trending Reports
- Intrusion Detection System
- Wireless Intrusion Detection System (WIDS) Event Reporting to W-AirWave
- RF Visualization Support for Instant
- PSK-based and Certificate-based Authentication
- Configurable Port for W-IAP and W-AirWave Management Server Communication
- Configuring Organization String
- Managing a W-IAP from W-AirWave
- Uplink Configuration
- Intrusion Detection
- Mesh W-IAP Configuration
- Mobility and Client Management
- Spectrum Monitor
- W-IAP Maintenance
- Monitoring Devices and Logs
- Hotspot Profiles
- Understanding Hotspot Profiles
- Configuring Hotspot Profiles
- Creating Advertisement Profiles for Hotspot Configuration
- Configuring an NAI Realm Profile
- Configuring a Venue Name Profile
- Configuring a Network Authentication Profile
- Configuring a Roaming Consortium Profile
- Configuring a 3GPP Profile
- Configuring an IP Address Availability Profile
- Configuring a Domain Profile
- Configuring an Operator-friendly Profile
- Configuring a Connection Capability Profile
- Configuring an Operating Class Profile
- Configuring a WAN Metrics Profile
- Creating a Hotspot Profile
- Associating an Advertisement Profile to a Hotspot Profile
- Creating a WLAN SSID and Associating Hotspot Profile
- Creating Advertisement Profiles for Hotspot Configuration
- Sample Configuration
- ClearPass Guest Setup
- IAP-VPN Deployment Scenarios
- Terminology
52 | Instant User Interface Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide
l Roles— Use this tab to view the roles defined for all the Networks. The Access Rules part allows you to
configure permissions for each role. For more information, see Configuring User Roles on page 204 and
Configuring ACL Rules for Network Services on page 189.
l Blacklisting— Use this tab to blacklist clients. For more information, see Blacklisting Clients on page 183.
l Firewall Settings— Use this tab to enable or disable Application Layer Gateway (ALG) supporting address
and port translation for various protocols and to configure protection against wired attacks. For more
information, see Configuring ALG Protocols on page 194 and Configuring Firewall Settings for Protection
from ARP Attacks on page 195
l Inbound Firewall— Use this tab to enhance the inbound firewall by allowing configuration of inbound
firewall rules, management subnets, and restricted corporate access through an uplink switch. For more
information, see Managing Inbound Traffic on page 196.
l Walled Garden—Use this tab to allow or prevent access to a selected list of websites. For more
information, see Configuring Walled Garden Access on page 150.
l External Captive Portal— Use this tab to configure external captive portal profiles. For more information,
see wConfiguring External Captive Portal for a Guest Network on page 138.
l Custom Blocked Page URL—Use this tab to create a list of URLs that can be blocked using an ACL rule.
For more information, see Creating Custom Error Page for Web Access Blocked by AppRF Policies on page
203.
Maintenance
The Maintenance link displays a window that allows you to maintain the Wi-Fi network. The Maintenance
window consists of the following tabs:
l About—Displays the name of the product, build time, W-IAP model name, the Instant version, website
address of Dell, and Copyright information. The About tab also displays the Dell Service Tag for the Dell W-
IAP.
This feature is not supported for some earlier W-IAP models, including W-IAP92/93, W-IAP104/105, W-
IAP114/115,W-IAP134/135, W-IAP155/155P, W-IAP175P/175AC, and W-IAP3WN/3WNP.
l Configuration— Displays the following details:
n Current Configuration—Displays the current configuration details.
n Clear Configuration —Allows you to clear the current configuration details of the network.
n Backup Configuration—Allows you to back up local configuration details. The backed up configuration
data is saved in the file named instant.cfg.
n Restore Configuration—Allows you to restore the backed up configuration. The W-IAP must be
rebooted after restoring the configuration for the changes to affect.
l Certificates—Displays information about the certificates installed on the W-IAP. You can also upload new
certificates to the W-IAP database. For more information, see Uploading Certificates on page 186.
l Firmware—Displays the current firmware version and provides various options to upgrade to a new
firmware version. For more information, see Upgrading a W-IAP on page 340.
l Reboot—Displays the W-IAPs in the network and provides an option to reboot the required access point or
all access points. For more information, see Upgrading a W-IAP on page 340.
l Convert—Provides an option to convert a W-IAP to a mobility controller managed Remote AP or Campus
AP, or to the default Virtual Controller mode. For more information, see Converting a W-IAP to a Remote AP
and Campus AP on page 344.
More
The More link allows you to select the following options: