User's Manual

Wireless Array
Configuring the Wireless Array 209
Security settings are configured with the following windows:
“Admin Management” on page 214
“Admin Privileges” on page 216
“Admin RADIUS” on page 218
“Management Control” on page 221
“Access Control List” on page 228
“Global Settings” on page 230
“External Radius” on page 234
“Internal Radius” on page 238
“Rogue Control List” on page 241
“OAuth 2.0 Management” on page 243
Understanding Security
The Xirrus Wireless Array incorporates many configurable security features.
After ini
tially installing an Array, always change the default administrator
password (the default is admin), and choose a strong replacement password
(containing letters, numbers and special characters). When appropriate, issue
read-only administrator accounts.
Other security considerations include:
SSH versus Telnet: Be aware that Telnet is not secure over network
connections and should be used only with a direct serial port connection.
When connecting to the unit’s Command Line Interface over a network
connection, you must use a Secure SHell version 2 (SSH-2) utility. SSH-2
provides stronger security than SSH-1. The most commonly used
freeware providing SSH tools is PuTTY.
Configuration auditing: The optional Xirrus Management System (XMS)
offers powerful management features for small or large Xirrus wireless
deployments, and can audit your configuration settings automatically. In
addition, using the XMS eliminates the need for an FTP server.
Choosing an encryption method: Wireless data encryption prevents
eavesdropping on data being transmitted or received over the airwaves.