User Manual
Table Of Contents
- Wireless Controller
- Contents
- 1. Introduction
- 2. Hardware Descriptions
- 3. System Planning and Deployment Scenarios
- 4. RF Planning and Deployment
- Application, Browser, and Port Requirements for RF Planning
- RF Planning Overview
- Manage a Building and Floors for an RF Plan
- Add a Building and Floors
- Add a Single Floor to a Building
- Scale a Floor
- Add a WiFi Coverage or WiFi Noncoverage Zone to a Floor
- Remove a WiFi Coverage or Noncoverage Zone From a Floor
- Add a WiFi Building Obstacle to a Floor
- Remove a Building Obstacle From a Floor
- Add a WiFi Obstruction Area
- Remove a WiFi Obstruction Area
- Change the Name, Map, or Dimensions of a Floor
- Change the Name of a Building
- Duplicate an Entire Building With All Floors
- Duplicate a Single Floor
- Remove a Single Floor
- Remove an Entire Building With All Its Floors
- Use the WiFi Auto Planning Advisor to Generate an RF Plan for a Floor
- Manually Add and Manage Access Points on a Floor Map for an RF Plan
- Manually Add and Manage Antennas on a Floor Map for an RF Plan
- Display and Recalculate the WiFi Coverage for a Heat Map
- Display or Change the WiFi Inventory for an RF Plan
- Download a Report for an RF Plan
- View the Heat Map for a Deployed Floor Plan
- 5. Installation and Configuration Overview
- 6. Configure the System and Network Settings and Register the Licenses
- 7. Manage Security Profiles and Profile Groups
- WiFi Security Profile Concepts
- Manage Security Profiles for the Basic Profile Group
- Manage Security Profiles for Advanced Profile Groups
- Network Authentication and Data Encryption Options
- Manage Authentication Servers and Authentication Server Groups
- Manage MAC Authentication and MAC Authentication Groups
- Guidelines for External MAC Authentication
- Remove a Local MAC Authentication Group
- 8. Discover and Manage Access Points
- 9. Configure WiFi, Radio Frequency, and QoS Settings
- Basic and Advanced WiFi, Radio Frequency Management, and QoS Configuration Concepts
- Configure the Radio On/Off Settings
- Configure WiFi Settings
- Radio Frequency Management Concepts
- Configure Automatic Transmission Power
- Override Transmission Power for Individual Access Points
- Configure WLAN Healing
- Enable Band Steering
- Configure Automatic Channel Allocation
- Override the Channel and Frequency for an Access Point
- Manage AirQual for a Profile Group
- Manage Quality of Service for an Advanced Profile Group
- Manage Load Balancing
- Manage Rate Limiting
- Manage the LED Behavior
- 10. Manage Rogue Access Points, Guest Network Access, and Users
- Manage Rogue Access Points
- Manage Guest Network Access Through Guest Portals and Captive Portals
- Manage Users, Accounts, and Passwords
- User and Account Concepts
- Change the Password of the Default admin Account of the Wireless Controller
- Add a Management User
- Add a WiFi User
- Add a Captive Portal Account
- Add a Logo and Message on Captive Portal User Information
- Add a Captive Portal User
- Add Multiple Captive Portal Users Simultaneously
- Change the Settings for a User or Account
- Remove Users or Accounts
- Export a List of Users or Accounts
- 11. Maintain the Wireless Controller and Access Points
- Manage the Configuration File or Upgrade the Firmware
- Reboot the Wireless Controller
- Reset the Wireless Controller
- Manage Extended Storage
- Manage Remote Access
- Specify Session Time-Outs
- Save the Logs
- View Alerts and Events
- Manage Licenses
- Reboot Access Points
- Configure Multicast Firmware Upgrade for Access Points
- 12. Manage Stacking and Redundancy
- Stacking Concepts
- Configure a Stack of Wireless Controllers
- Remove a Wireless Controller From a Stack
- Select Which Wireless Controller in a Stack to Configure
- Manage Redundancy for a Single Controller
- Manage a Redundancy Group With N:1 Redundancy
- Replace a Redundant Controller
- Remove a Redundancy Group
- Upgrade Firmware in a Stacked Redundancy Group
- 13. Monitor the WiFi Network and Its Components
- Monitor the Network
- Monitor the Wireless Controller
- View the Wireless Controller Summary Page
- View Wireless Controller Usage
- View Access Points That the Wireless Controller Manages
- View Clients on Access Points That the Wireless Controller Manages
- View Neighboring Clients That the Wireless Controller Detects
- View Neighboring Access Points That the Wireless Controller Does Not Manage
- View Security Profiles That the Wireless Controller Manages
- View DHCP Leases That Are Provided by the Wireless Controller
- View Captive Portal Users on Access Points That the Wireless Controller Manages
- View the Guest Email Address Database for Access Points That the Wireless Controller Manages
- View AirQual for the Channels in a Profile Group
- Monitor the SSIDs on the Wireless Controller
- Monitor Local Clients in the Network
- 14. Troubleshooting and Diagnostics
- Troubleshoot Basic Functioning
- Troubleshoot the Web Management Interface
- Troubleshoot a TCP/IP Network Using the Ping Utility
- Use the Reset Button to Restore Default Settings
- Resolve Problems With Date and Time
- Resolve Network Problems
- Resolve Problems With Access Points
- Use the Diagnostic Tools on the Wireless Controller
- A. Controller-Managed Access Points
- Overview
- Change IP Address and VLAN Settings on a Controller-Managed Access Point
- Reenable the DHCP Client on a Controller-Managed Access Point
- Upgrade or Change Firmware on a Controller-Managed Access Point
- Save and View the Logs on a Controller-Managed Access Point
- Enable Link Aggregation on a WAC740 Access Point
- Change the Password on an Access Point
- Convert an Access Point From Controller-Managed to Standalone
- B. Factory Default Settings, Technical Specifications, and Passwords Requirements
- Index
Manage Security Profiles and Profile Groups
142
Wireless Controller
a more complex network with many profiles. You can then assign different RADIUS
servers to different profiles.
By default, the external RADIUS server for the basic authentication group is called
basic-Auth. You cannot change this name. By default, the external RADIUS
authentication servers for the advanced authentication groups are called Auth1 through
Auth8, and you can change these names. You can assign the basic-Auth server to an
advanced profile group, and you can assign a RADIUS server of an advanced
authentication group to the basic profile group.
See the following configuration guidelines for external RADIUS servers:
- Y
ou must add the IP address of the wireless controller as a RADIUS client to the
RADIUS server
. All managed access points are then automatically known to the
RADIUS server.
- For configuration guidelines for external MAC authentication, see Guidelines for
External MAC Authentication on page 147.
- For configuration guidelines for external authentication of captive portal users, see
Manage Guest Network Access Through Guest Portals and Captive Portals on
page 232.
• External LDAP server. Y
ou can define one external LDAP server (commonly referred to
as an Active Directory [AD] server). You must specify its configuration on the basic
Authentication Server page (see Configure Basic Authentication Server Settings on
page 143) so that you can select this authentication option during the configuration of a
profile.
By default, the external LDAP server for the basic authentication group is called
basic-LDAP
.
You cannot change this name, and you cannot configure any LDAP servers
for the advanced authentication groups. You can assign the basic-LDAP server to both
the basic profile group and to advanced profile groups.
All three servers can be active so that the profiles that you set up can be configured to work
with different authentication servers. For example, you could set up a guest profile with no
authentication, an engineering profile that uses external RADIUS authentication, and a
marketing profile that uses external LDAP authentication.
Note: For authentication, you can configure and use a single LDAP server
only. However, you can configure and use several RADIUS servers.
The settings that you specify on the Authentication Server page affect the selections that are
available in the Network Authentication menu and the corresponding Authentication
Server field on the Edit Profile page. For information about how to configure security profiles,
see Configure a Profile in the Basic Profile Group on page 125 and Configure a Profile in an
Advanced Profile Group on page 132.