User's Guide

Table of Contents
APPENDIX 1: MODULE / DEVICE
MANAGEMENT ................................... 39
INTRODUCTION....................................1
INSTALLATION .....................................2
DEVICE .................................................... 39
CONFIGURE............................................. 40
ASSEMBLY AND SELF IDENTIFICATION ...2
SECURITY ................................................ 43
MANAGER/ONE..........................................2
MONITOR ................................................ 44
HOST NETWORK REQUIREMENTS ...........9
USER SECURITY CONSIDERATIONS .......11
APPENDIX 2: SPECIFICATIONS ..... 46
MANAGEMENT ...................................13
PHYSICAL ATTRIBUTES ......................... 46
EMISSIONS AND SAFETY STANDARDS ... 46
LOAD IMAGE ...........................................16
USER COVERAGE RANGES FOR
BLUETOOTH, 802.11A, 802.11B, &
802.11G.................................................... 47
REBOOT NETWORK ................................17
UPDATE NAMES.......................................17
UPDATE MEMBERSHIP............................18
RENAME NETWORK................................18
APPENDIX 3: CLI COMMANDS....... 48
VIEW ACTION STATUS............................18
NODE STATUS..........................................20
APPENDIX 4: FREQUENTLY ASKED
QUESTIONS.......................................... 54
CONFIGURATION...............................22
NETWORK ELEMENTS............................ 54
SYSTEM CONFIGURATION ......................22
PRODUCT ASSEMBLY AND SETUP.......... 55
STATIC NETWORK SERVERS ..................23
PRODUCT PERFORMANCE...................... 57
WIFI.........................................................24
SYSTEM SOFTWARE AND OPERATION .. 57
ADVANCED WIFI.....................................26
SECURITY ................................................ 59
BLUETOOTH ............................................29
SYSTEM MANAGEMENT ......................... 60
FIRMWARE FTP .......................................30
INSTALLATION CONSIDERATIONS......... 61
SECURITY .............................................31
APPENDIX 5: SECURITY OVERVIEW
................................................................. 64
WIFI SECURITY.......................................31
NETWORK CONNECT (WIRELESS UPLINK)
SECURITY ................................................33
AUTHENTICATION .................................. 65
ENCRYPTION........................................... 67
WIFI ACL ...............................................34
SOME ATTACK TYPES ............................ 68
BLUETOOTH SECURITY ..........................36
SECURITY DEVICES ................................ 68
IEEE 802.11I........................................... 68
INVENTORY .........................................38
WI-FI AND WPA REQUIREMENTS ......... 69
APPLY CONFIGURATION.................38
GLOSSARY ........................................... 70