User Manual

Table Of Contents
Installation and Configuration Overview
98
Wireless Controller
6. (Optional but recommended) Configure logs, alerts, and alarms.
For more information, see Configure Syslog, Alarm Notification, and Email Settings on
page 115.
7. Configure security profiles:
a. Configure the security profiles for the basic profile group or for advanced profile
groups.
For detailed configuration steps, see:
Manage Security Profiles for the Basic Profile Group on page 125.
Manage Security Profiles for Advanced Profile Groups on page 130.
b. (Optional) Configure authentication servers.
For more information, see Manage Authentication Servers and Authentication Server
Groups on page 141.
c. (Optional) Configure MAC authentication.
For more information, see Manage MAC Authentication and MAC Authentication
Groups on page 147.
d. (Optional)
Assign the authentication servers and MAC
ACLs to the security profiles.
For more information, see:
Manage Security Profiles for the Basic Profile Group on page 125.
Manage Security Profiles for Advanced Profile Groups on page 130.
8. Configure the managed access point list:
a. Run the Discovery Wizard and add access points to the managed list.
For more information, see Discover Access Points With the Discovery Wizard on
page 160.
b. (Optional) Configure access points that are on the managed list.
For more information, see Manage the Managed AP List on page 168.
c. (Optional) Assign
access
points to advanced profile groups.
For more information, see Assign Access Points to Buildings, Floors, and Advanced
Profile Groups on page 175.
9. (Optional) Configure rogue access point detection.
For more information, see Manage Rogue Access Points on page 228.
10. (Optional) Configure a guest portal or captive portal.
For more information, see Manage Guest Network Access Through Guest Portals and
Captive Portals on page 232.
11. (Optional) Configure user accounts and portal accounts.
For more information, see Manage Users, Accounts, and Passwords on page 244.