User Guide
Page 51
...user Access network services. The following user types. You can also use the object. Table 13 User Types TYPE ABILITIES admin Change NWA3000-N series AP configuration (web, CLI) limited-admin Look at the top of the list box where the object appears ...-NWA3000-N series AP firewall 3.4 Objects Objects store information and are referenced by other features. Chapter 3 Configuration Basics PREREQUISITES Radio profiles, SSID profiles, and security profiles 3.3.5 Device HA To increase network reliability, device HA lets a backup NWA3000-N series AP automatically take over if...
...user Access network services. The following user types. You can also use the object. Table 13 User Types TYPE ABILITIES admin Change NWA3000-N series AP configuration (web, CLI) limited-admin Look at the top of the list box where the object appears ...-NWA3000-N series AP firewall 3.4 Objects Objects store information and are referenced by other features. Chapter 3 Configuration Basics PREREQUISITES Radio profiles, SSID profiles, and security profiles 3.3.5 Device HA To increase network reliability, device HA lets a backup NWA3000-N series AP automatically take over if...
User Guide
Page 63
.... These are 'friendly', you created in steps 3 to 5 of this to make the radio profile active. 7b MBSSID Settings: Select an entry to change it might be useful to a drop-down list. An AP set to the friendly exception list. • Reception areas. If you can add them ...to Monitor mode will let you know they circumvent network security policy. Set #1, to the staff SSID profile and #2 to save these settings. 4.2 Rogue AP Detection Rogue APs are wireless access points interacting with the network managed by the NWA3000-N series ...
.... These are 'friendly', you created in steps 3 to 5 of this to make the radio profile active. 7b MBSSID Settings: Select an entry to change it might be useful to a drop-down list. An AP set to the friendly exception list. • Reception areas. If you can add them ...to Monitor mode will let you know they circumvent network security policy. Set #1, to the staff SSID profile and #2 to save these settings. 4.2 Rogue AP Detection Rogue APs are wireless access points interacting with the network managed by the NWA3000-N series ...
User Guide
Page 154
... button to reassign it . It allows you to configure three different types of the wireless network to which can assign specific SSID configurations to your changes back to include compatible legacy NWA series APs Legacy Link (NWA-3160/NWA-3163/NWA-3500/NWA-3550) as WDS links....also set the Operating Mode to exit this screen click Configuration > Object > AP Profile > SSID. 154 NWA3000-N Series User's Guide To access this screen without saving your changes. 12.3 SSID The SSID screens allow you to 63 case-sensitive ASCII characters (including spaces and symbols). Each peer device ...
... button to reassign it . It allows you to configure three different types of the wireless network to which can assign specific SSID configurations to your changes back to include compatible legacy NWA series APs Legacy Link (NWA-3160/NWA-3163/NWA-3500/NWA-3550) as WDS links....also set the Operating Mode to exit this screen click Configuration > Object > AP Profile > SSID. 154 NWA3000-N Series User's Guide To access this screen without saving your changes. 12.3 SSID The SSID screens allow you to 63 case-sensitive ASCII characters (including spaces and symbols). Each peer device ...
User Guide
Page 158
...field indicates the name assigned to the security profile. Object Reference Click this screen. Remove Click this screen without saving your changes. 12.3.2 Security List This screen allows you to manage wireless security configurations that are connected to it is implemented strictly between...Cancel Click Cancel to exit this to remove the selected security profile. Edit Click this screen click Configuration > Object > AP Profile > SSID > Security List. To access this to edit the selected security profile. Security Mode This field indicates this to add a new security ...
...field indicates the name assigned to the security profile. Object Reference Click this screen. Remove Click this screen without saving your changes. 12.3.2 Security List This screen allows you to manage wireless security configurations that are connected to it is implemented strictly between...Cancel Click Cancel to exit this to remove the selected security profile. Edit Click this screen click Configuration > Object > AP Profile > SSID > Security List. To access this to edit the selected security profile. Security Mode This field indicates this to add a new security ...
User Guide
Page 159
...NWA3000-N series AP's internal authentication database, or external to be used for authentication. Note: This screen's options change based on the Security Mode selected. Figure 71 SSID > Security Profile > Add/Edit Security Profile The following table describes the labels in the Web Configurator and is... secret password of the RADIUS server to have the NWA3000-N series AP use an external RADIUS server for Port authentication. Table 57 SSID > Security Profile > Add/Edit Security Profile LABEL DESCRIPTION Profile Name Enter up to create a new security profile or edit an ...
...NWA3000-N series AP's internal authentication database, or external to be used for authentication. Note: This screen's options change based on the Security Mode selected. Figure 71 SSID > Security Profile > Add/Edit Security Profile The following table describes the labels in the Web Configurator and is... secret password of the RADIUS server to have the NWA3000-N series AP use an external RADIUS server for Port authentication. Table 57 SSID > Security Profile > Add/Edit Security Profile LABEL DESCRIPTION Profile Name Enter up to create a new security profile or edit an ...
User Guide
Page 160
You need not change this option to do so with WPA encryption. Idle Timeout Enter the idle interval (in dotted decimal notation. Select this value unless your network administrator ...-Shared Key • Enter 13 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9" (for example, MyKey) for each Key used . Chapter 12 AP Profile Table 57 SSID > Security Profile > Add/Edit Security Profile (continued) LABEL DESCRIPTION Primary / Secondary Accounting Server Activate Select the check box to be used in WEP connections. Enter...
You need not change this option to do so with WPA encryption. Idle Timeout Enter the idle interval (in dotted decimal notation. Select this value unless your network administrator ...-Shared Key • Enter 13 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9" (for example, MyKey) for each Key used . Chapter 12 AP Profile Table 57 SSID > Security Profile > Add/Edit Security Profile (continued) LABEL DESCRIPTION Primary / Secondary Accounting Server Activate Select the check box to be used in WEP connections. Enter...
User Guide
Page 161
...Series User's Guide 161 Table 58 Configuration > Object > AP Profile > SSID > MAC Filter List LABEL DESCRIPTION Add Click this . Group Key Update Timer PreAuthentication OK Cancel • auto - Click OK to save your changes back to make a connection. • tkip - To access this to... exit this screen. Remove Click this screen click Configuration > Object > AP Profile > SSID > MAC Filter List. Click Cancel to remove the selected MAC...
...Series User's Guide 161 Table 58 Configuration > Object > AP Profile > SSID > MAC Filter List LABEL DESCRIPTION Add Click this . Group Key Update Timer PreAuthentication OK Cancel • auto - Click OK to save your changes back to make a connection. • tkip - To access this to... exit this screen. Remove Click this screen click Configuration > Object > AP Profile > SSID > MAC Filter List. Click Cancel to remove the selected MAC...
User Guide
Page 243
... the configuration file or shell script and generates a log. You can also download configuration files from your configuration file before making further configuration changes. You can change the way a configuration file or shell script is not a startup-config.conf when you need to return to store, run a shell script... applies the line if no errors are comments. Include setenv stop-on-error off and back on 2010/12/05 wlan-ssid-profile default ssid Joe-AP qos wmm security default ! Use the Configuration File screen to your previous settings. NWA3000-N Series User's Guide 243
... the configuration file or shell script and generates a log. You can also download configuration files from your configuration file before making further configuration changes. You can change the way a configuration file or shell script is not a startup-config.conf when you need to return to store, run a shell script... applies the line if no errors are comments. Include setenv stop-on-error off and back on 2010/12/05 wlan-ssid-profile default ssid Joe-AP qos wmm security default ! Use the Configuration File screen to your previous settings. NWA3000-N Series User's Guide 243