Symbol Technologies AP-4131 Network Router User Manual


 
vi AP-4131 Access Point Product Reference Guide
2.1.4 Using a Web Browser........................................................41
2.2 Navigating the UI .......................................................................48
2.2.1 Entering Admin Mode .......................................................50
2.2.2 Changing the Access to the UI ...........................................51
2.2.3 Configuring for Dial-Up to the UI.......................................53
2.2.4 Navigating the UI Using a Web Browser .............................54
2.3 Access Point Installation...............................................................54
2.4 Configuring System Parameters....................................................59
2.4.1 Encryption Administration ..................................................66
2.4.2 System Password Administration.........................................69
2.5 Configuring Radio Parameters .....................................................71
2.5.1 Wireless AP Operation Parameters .....................................80
2.5.2 Enhanced Packet Prioritization (EPP)....................................85
2.5.3 Enhanced Interference Avoidance Properties (EIAP) ..............86
2.6 Encryption Configuration and Key Maintenance.............................88
2.6.1 40-Bit WEP Encryption.......................................................90
2.6.2 128-Bit WEP Encryption.....................................................92
2.6.3 Manual Kerberos Authentication Configuration ...................94
2.6.4 Configuring EAP-TLS Support.............................................97
2.6.5 Configuring Mixed Mode Security.....................................100
2.7 Configuring the SNMP Agent .....................................................102
2.7.1 Configuring SNMPv3 Security ..........................................108
2.8 ACL and Address Filtering .........................................................111
2.8.1 Configuring the ACL .......................................................113
2.8.2 Range of MUs ................................................................113
2.8.3 Adding Allowed MUs ......................................................115
2.8.4 Removing Allowed MUs...................................................115
2.8.5 ACL Options ..................................................................116
2.8.6 Removing All Allowed MUs..............................................116
2.8.7 Load ACL from MU List ...................................................116
2.8.8 Load ACL from File.........................................................117