Allied Telesis AT-WA7501 Network Card User Manual


 
AT-WA7500 and AT-WA7501 Installation and User’s Guide
5
Chapter 6
Configuring Security .................................................................................................................................................... 169
Understanding Security ................................................................................................................................................... 170
When You Configure Different SSIDs with Different Security Settings ....................................................................172
When You Include Multiple RADIUS Servers on the RADIUS Server List ...............................................................173
Controlling Access to Access Point Menus ..................................................................................................................... 174
Enabling Access Methods ........................................................................................................................................174
Setting Up Logins .....................................................................................................................................................176
Creating a Secure Spanning Tree ................................................................................................................................... 181
Enabling Secure Communications Between Access Points and End Devices................................................................ 184
Using an Access Control List (ACL) .........................................................................................................................184
Configuring VLANs...................................................................................................................................................187
Configuring WEP 64/128/152 Security.....................................................................................................................189
Implementing an 802.1x Security Solution ...............................................................................................................192
Configuring Wi-Fi Protected Access (WPA) Security ...............................................................................................199
Chapter 7
Configuring the Embedded Authentication Server (EAS) ........................................................................................ 204
About the Embedded Authentication Server (EAS) ......................................................................................................... 205
About Certificates ............................................................................................................................................................ 206
Understanding Which Access Points Need Certificates...........................................................................................206
Understanding Which Certificates Are Installed by Default......................................................................................206
Viewing the Certificates Installed on an Access Point..............................................................................................207
Installing and Uninstalling Certificates......................................................................................................................208
Configuring the EAS ........................................................................................................................................................ 210
Enabling the EAS .....................................................................................................................................................210
Configuring the Database.........................................................................................................................................212
Using the Rejected List ............................................................................................................................................215
Exporting and Importing Databases .........................................................................................................................217
Chapter 8
Managing, Troubleshooting, and Upgrading Access Points .................................................................................... 220
Managing the Access Points ........................................................................................................................................... 221
Using the Wavelink Avalanche Client Management System....................................................................................221
Using Simple Network Management Protocol (SNMP) ............................................................................................226
Maintaining the Access Points......................................................................................................................................... 228
Viewing AP Connections ..........................................................................................................................................228
Viewing AP Neighbors..............................................................................................................................................231
Viewing Port Statistics..............................................................................................................................................234
Viewing DHCP Status ..............................................................................................................................................235
Viewing the Events Log............................................................................................................................................236
Viewing the About This Access Point Screen...........................................................................................................237
Using the LEDs to Locate Access Points .................................................................................................................238
Restoring the Access Point to the Default Configuration..........................................................................................239
Troubleshooting the Access Points ................................................................................................................................. 240
Using the Configuration Error Messages..................................................................................................................240
Troubleshooting With the LEDs................................................................................................................................245
General Troubleshooting..........................................................................................................................................246
Troubleshooting the Radios .....................................................................................................................................251
Troubleshooting Security..........................................................................................................................................255
Recovering a Failed Access Point............................................................................................................................258
Upgrading the Access Points ....................................................................................................
...................................... 261
Using a Web Browser Interface................................................................................................................................261
Troubleshooting the Upgrade...................................................................................................................................262
Chapter 9
Additional Access Point Features ............................................................................................................................... 263
Understanding the Access Point Segments .................................................................................................................... 264
Understanding Transparent Files .................................................................................................................................... 265