Manual Part 2
Wireless Array
214 Configuring the Wireless Array
Security settings are configured with the following windows:
“Admin Management” on page 219
“Admin Privileges” on page 221
“Admin RADIUS” on page 223
“Management Control” on page 226
“Access Control List” on page 234
“Global Settings” on page 236
“External Radius” on page 240
“Internal Radius” on page 244
“Active Directory” on page 246
“Rogue Control List” on page 250
“OAuth 2.0 Management” on page 251
Understanding Security
The Xirrus Wireless Array incorporates many configurable security features.
After initially installing an Array, always change the default administrator
password (the default is admin), and choose a strong replacement password
(containing letters, numbers and special characters). When appropriate, issue
read-only administrator accounts.
Other security considerations include:
SSH versus Telnet: Be aware that Telnet is not secure over network
connections and should be used only with a direct serial port connection.
When connecting to the unit’s Command Line Interface over a network
connection, you must use a Secure SHell version 2 (SSH-2) utility. SSH-2
provides stronger security than SSH-1. The most commonly used
freeware providing SSH tools is PuTTY.
Configuration auditing: The optional Xirrus Management System (XMS)
offers powerful management features for small or large Xirrus wireless
deployments, and can audit your configuration settings automatically. In
addition, using the XMS eliminates the need for an FTP server.