Allied Telesis AT-TQ2403 Network Card User Manual


 
AT-TQ2403 Management Software User's Guide 35
Intra-Cluster Security
For purposes of ease-of-use, the clustering component is designed to let new devices join a cluster
without strong authentication. However, communications of all data between access points in a cluster is
protected against casual eavesdropping using Secure Sockets Layer (typically referred to as SSL). The
assumption is that the private wired network to which the devices are connected is secure. Both the
cluster configuration file and the user database are transmitted among access points using SSL.
Understanding Access Point Settings
The Access Points tab provides information about all access points in the cluster.
From this page, you can view location descriptions, MAC addresses, IP addresses, enable (activate) or
disable (deactivate) clustered access points, and remove access points from the cluster. You can also
modify the location description for an access point.
The IP address links provide a way to navigate to configuration settings and data on an access point.
Stand-alone access points (those which are not members of the cluster) are not shown on this page.
Figure 12: Access Points Setting Page
T
he following table describes the access point settings and information display in detail.
Field Description
Location Description of where the access point is physically located.