beautypg.com

Symbol Technologies Spectrum24 AP-4131 User Manual

Page 6

background image

vi

AP-4131 Access Point Product Reference Guide

2.1.4 Using a Web Browser........................................................41

2.2 Navigating the UI .......................................................................48

2.2.1 Entering Admin Mode .......................................................50
2.2.2 Changing the Access to the UI ...........................................51
2.2.3 Configuring for Dial-Up to the UI.......................................53
2.2.4 Navigating the UI Using a Web Browser .............................54

2.3 Access Point Installation...............................................................54
2.4 Configuring System Parameters....................................................59

2.4.1 Encryption Administration ..................................................66
2.4.2 System Password Administration.........................................69

2.5 Configuring Radio Parameters .....................................................71

2.5.1 Wireless AP Operation Parameters .....................................80
2.5.2 Enhanced Packet Prioritization (EPP)....................................85
2.5.3 Enhanced Interference Avoidance Properties (EIAP) ..............86

2.6 Encryption Configuration and Key Maintenance.............................88

2.6.1 40-Bit WEP Encryption.......................................................90
2.6.2 128-Bit WEP Encryption.....................................................92
2.6.3 Manual Kerberos Authentication Configuration ...................94
2.6.4 Configuring EAP-TLS Support.............................................97
2.6.5 Configuring Mixed Mode Security.....................................100

2.7 Configuring the SNMP Agent .....................................................102

2.7.1 Configuring SNMPv3 Security ..........................................108

2.8 ACL and Address Filtering .........................................................111

2.8.1 Configuring the ACL .......................................................113
2.8.2 Range of MUs ................................................................113
2.8.3 Adding Allowed MUs ......................................................115
2.8.4 Removing Allowed MUs...................................................115
2.8.5 ACL Options ..................................................................116
2.8.6 Removing All Allowed MUs ..............................................116
2.8.7 Load ACL from MU List ...................................................116
2.8.8 Load ACL from File .........................................................117