EWS Series User Manual

2
1.2
GLOBAL POLICY ...................................................................................................................................................... 60
6 HOW TO GENERATE YOUR SCENARIOS ........................................................................................................................ 61
6.1 USER GROUPS, USER POLICIES, SERVICE ZONES AND SCHEDULE .............................................................................................. 61
6.2 BLACKLISTS AND PRIVILEGE LISTS ....................................................................................................................................... 64
Blacklists ............................................................................................................................................................... 64
IP Privilege List ...................................................................................................................................................... 64
IPv6 Privilege List .................................................................................................................................................. 64
MAC Privilege List ................................................................................................................................................. 65
MAC Access Control List ........................................................................................................................................ 65
6.3 ADDITIONAL CONTROL .................................................................................................................................................... 65
7 HOW TO CONFIGURE ACCESS POINT IN LAPM ............................................................................................................ 67
7.1 AP LIST AND OVERVIEW .................................................................................................................................................. 67
7.2 AP ADDING AND CONFIGURATION ..................................................................................................................................... 68
7.3 TEMPLATE ..................................................................................................................................................................... 69
7.4 AP FIRMWARE MANAGEMENT ......................................................................................................................................... 71
7.5 WDS MANAGEMENT ...................................................................................................................................................... 71
7.6 ROGUE AP DETECTION .................................................................................................................................................... 72
7.7 AP LOAD BALANCING ...................................................................................................................................................... 72
8 HOW TO CONFIGURE ACCESS POINT IN WAPM ........................................................................................................... 74
8.1 AP LIST ........................................................................................................................................................................ 75
8.2 GRAPHICAL MONITORING ................................................................................................................................................ 75
Google Map Integration ....................................................................................................................................... 75
AP Grouping .......................................................................................................................................................... 82
8.3 AP ADDING AND CONFIGURATION ...................................................................................................................................... 84
AP discovery .......................................................................................................................................................... 84
How to prepare CAPWAP application ................................................................................................................... 85
CAPWAP with Complete Tunnel ............................................................................................................................ 87
CAPWAP with Split Tunnel .................................................................................................................................... 89
8.4 TEMPLATE ..................................................................................................................................................................... 90
8.5 WDS MANAGEMENT ...................................................................................................................................................... 93
8.6 AP FIRMWARE MANAGEMENT .......................................................................................................................................... 93
Backup Configuration ........................................................................................................................................... 93
Firmware .............................................................................................................................................................. 94
8.7 ROGUE AP DETECTION .................................................................................................................................................... 94
8.8 AP LOAD BALANCING ...................................................................................................................................................... 94
9 HOW TO CONFIGURE SWITCH MANAGEMENT ............................................................................................................ 96
9.1 SWITCH LIST .................................................................................................................................................................. 96
9.2 POE SCHEDULE TEMPLATE ............................................................................................................................................... 96
9.3 BACKUP CONFIGURATION ................................................................................................................................................. 97
10 HOW TO REALIZE WI-FI MONITOR............................................................................................................................... 98
10.1 ADD A FLOOR PLAN ........................................................................................................................................................ 98
10.2 SIMULATION AP ........................................................................................................................................................... 101
10.3 AP MONITORING ON FLOOR PLAN .................................................................................................................................. 103
11 HOW TO ENABLE VPN FEATURE ................................................................................................................................ 104
11.1 REMOTE VPN PPTP ..................................................................................................................................................... 104
11.2 REMOTE VPN IKEV2 .................................................................................................................................................... 104