Contents
6
Security Considerations Related to WDS Bridges.......................................................................................................173
WDS Guidelines ..........................................................................................................................................................174
Configuring WDS Settings ..................................................................................................................................................176
Example of Configuring a WDS Link ...........................................................................................................................179
Chapter 17: Maintenance and Monitoring .....................................................................................................................181
Monitoring Wired and Wireless LAN Settings.....................................................................................................................182
Viewing the Event Logs ......................................................................................................................................................184
Log Relay Host for Kernel Messages ..........................................................................................................................185
Setting Up the Log Relay Host .............................................................................................................................185
Enabling or Disabling the Log Relay Host............................................................................................................186
Events Log...................................................................................................................................................................186
Viewing the Transmit/Receive Statistics.............................................................................................................................188
Viewing the Associated Wireless Clients............................................................................................................................190
Link Integrity Monitoring ..............................................................................................................................................190
What is the Difference Between an Association and a Session? ................................................................................190
Viewing the Status of Neighboring Access Points ..............................................................................................................191
Viewing System Information ...............................................................................................................................................195
Setting the Administrator Password....................................................................................................................................197
Enabling the Network Time Protocol (NTP) Server ............................................................................................................200
Setting the HTTP Timeout ..................................................................................................................................................202
Rebooting the Access Point................................................................................................................................................203
Resetting the Configuration to Factory Defaults .................................................................................................................204
Upgrading the Firmware .....................................................................................................................................................205
Verifying the Firmware Upgrade..................................................................................................................................206
SNMP Firmware Upgrade...................................................................................................................................................207
Chapter 18: Backing Up and Restoring a Configuration ..............................................................................................209
Backing up the Configuration Settings for an Access Point................................................................................................210
Restoring Access Point Settings to a Previous Configuration ............................................................................................211
Appendix A: Management Software Default Settings ..................................................................................................213
Appendix B: Configuring Security on Wireless Clients ...............................................................................................215
Network Infrastructure and Choosing Between the Built-in or External Authentication Server...........................................217
I Want to Use the Built-in Authentication Server (EAP-PEAP) ....................................................................................217
I Want to Use an External RADIUS Server with EAP-TLS Certificates or EAP-PEAP................................................21
7
Make Sure the Wireless Client Software is Up to Date.......................................................................................................218
Accessing the Microsoft Windows Wireless Client Security Settings .................................................................................219
Configuring a Client to Access an Unsecure Network (Plain Text mode)....................................................................221
Configuring Static WEP Security on a Client ...............................................................................................................222
Connecting to the Wireless Network with a Static WEP Client.............................................................................224
Configuring IEEE 802.1x Security on a Client .............................................................................................................225
IEEE 802.1x Client Using EAP/PEAP ..................................................................................................................225
IEEE 802.1x Client Using EAP/TLS Certificate ....................................................................................................229
Configuring WPA/WPA2 Enterprise (RADIUS) Security on a Client...................................................................................234
WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP........................................................................................234
WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate .........................................................................239
Configuring WPA/WPA2 Personal (PSK) Security on a Client ...........................................................................................243
Configuring an External RADIUS Server to Recognize the AT-WA7400 Wireless Access Point .......................................246
Obtaining a TLS-EAP Certificate for a Client ......................................................................................................................251
Appendix C: Troubleshooting ........................................................................................................................................257
Wireless Distribution System (WDS) Problems and Solutions ...........................................................................................258
Cluster Recovery ................................................................................................................................................................259
Reboot or Reset the Access Point...............................................................................................................................259
Stop Clustering and Reset Each Access Point in the Cluster.....................................................................
.................259
Appendix D: Command Line Interface (CLI) for Access Point Configuration ............................................................263
Comparison of Settings Configurable with the CLI and Web UI .........................................................................................264
Accessing the CLI for an Access Point...............................................................................................................................267
Telnet Connection to the Access Point........................................................................................................................267
Komentáře k této Příručce