User's Manual
Table Of Contents
- Table of Contents
- List of Figures
- Introduction
- Installing the Wireless Array
- Installation Prerequisites
- Planning Your Installation
- Installation Workflow
- Installing Your Wireless Array
- Powering Up the Wireless Array
- Establishing Communication with the Array
- Entering the License
- Performing the Express Setup Procedure
- The Web Management Interface
- Viewing Status on the Wireless Array
- Configuring the Wireless Array
- Express Setup
- Network
- Services
- VLANs
- Tunnels
- Security
- SSIDs
- Groups
- IAPs
- WDS
- Filters
- Clusters
- Using Tools on the Wireless Array
Wireless Array
vii
RF Monitor .............................................................................................. 314
RF Resilience .......................................................................................... 315
RF Power & Sensitivity ......................................................................... 316
RF Spectrum Management ................................................................... 318
Station Assurance .................................................................................. 320
Hotspot 2.0 ..................................................................................................... 322
Understanding Hotspot 2.0 .................................................................. 322
NAI Realms .................................................................................................... 325
Understanding NAI Realm Authentication ....................................... 325
NAI EAP ......................................................................................................... 326
Intrusion Detection ....................................................................................... 328
DoS Attacks ............................................................................................ 329
Impersonation Attacks .......................................................................... 330
About Blocking Rogue APs .................................................................. 331
RF Intrusion Detection and Auto Block Mode .................................. 331
DoS Attack Detection Settings ............................................................. 332
Impersonation Detection Settings ....................................................... 333
LED Settings .................................................................................................. 334
DSCP Mappings ............................................................................................ 335
Roaming Assist .............................................................................................. 336
WDS ....................................................................................................................... 338
About Configuring WDS Links ........................................................... 338
Long Distance Links .............................................................................. 339
WDS Client Links .......................................................................................... 340
Filters ..................................................................................................................... 344
Filter Lists ...................................................................................................... 345
Filter Management ....................................................................................... 347
Clusters .................................................................................................................. 352
Cluster Definition ........................................................................................ 353
Cluster Management ................................................................................... 354
Cluster Operation ........................................................................................ 355
Using Tools on the Wireless Array............................................... 359
System Tools ......................................................................................................... 360
About Licensing and Upgrades ........................................................... 361
System ..................................................................................................... 362
Automatic Updates from Remote Image or
Conf
iguration File .... 363