beautypg.com

Allied Telesis AT-WA7400/EU User Manual

Page 4

background image

Contents

4

Modifying the Location Description................................................................................................................................49
Removing an Access Point from the Cluster .................................................................................................................49
Adding an Access Point to a Cluster .............................................................................................................................50

Navigating to Configuration Information for a Specific Access Point and Managing Standalone Access Points .................52

Navigating to an Access Point by Using its IP Address in a URL..................................................................................52

Configuring MAC Address Filtering.......................................................................................................................................53
MAC Filtering of Rogue Access Points .................................................................................................................................55

Chapter 4: Managing User Accounts ...............................................................................................................................57
Adding a User .......................................................................................................................................................................58
Editing a User Account .........................................................................................................................................................60

Enabling a User Account ...............................................................................................................................................60
Disabling a User Account ..............................................................................................................................................61
Removing a User Account.............................................................................................................................................61

Backing Up and Restoring a User Database ........................................................................................................................62

Backing Up the User Database .....................................................................................................................................62
Restoring a User Database from a Backup File ............................................................................................................63

Chapter 5: Session Monitoring .........................................................................................................................................65
Viewing Sessions Information...............................................................................................................................................66

Viewing Specific Session Information............................................................................................................................67
Sorting Session Information ..........................................................................................................................................68

Chapter 6: Channel Management .....................................................................................................................................69
Understanding Channel Management ..................................................................................................................................70

How it Works in a Nutshell.............................................................................................................................................70
Overlapping Channels ...................................................................................................................................................70
Example: A Network Before and After Channel Management.......................................................................................71

Displaying the Channel Management Settings .....................................................................................................................72
Configuring the Channel Management Settings ...................................................................................................................73

Stopping or Starting Automatic Channel Assignment....................................................................................................73
Viewing Current Channel Assignments and Setting Locks............................................................................................73
Updating the Current Channel Settings Manually..........................................................................................................74
Viewing the Last Proposed Set of Changes ..................................................................................................................74
Configuring Advanced Settings (Customizing and Scheduling Channel Plans) ............................................................75

Chapter 7: Wireless Neighborhoods ................................................................................................................................79
Understanding Wireless Neighborhood Information .............................................................................................................80
Displaying the Wireless Neighborhood Information ..............................................................................................................81
Viewing Details of a Cluster Member....................................................................................................................................84

Chapter 8: Configuring Ethernet (Wired) Settings ..........................................................................................................87
Setting the DNS Name..........................................................................................................................................................88
Enabling or Disabling Guest Access.....................................................................................................................................90

Configuring an Internal LAN and a Guest Network........................................................................................................90
Enabling or Disabling Guest Access..............................................................................................................................90
Enabling or Disabling Virtual Wireless Networks on the Access Point ..........................................................................90

Enabling or Disabling Spanning Tree ...................................................................................................................................92
Configuring the Internal Interface Ethernet Settings .............................................................................................................93
Configuring the Guest Interface Settings ..............................................................................................................................96

Chapter 9: Configuring the Wireless Settings ................................................................................................................97
Configuring 802.11d Regulatory Domain Support ................................................................................................................98
Configuring the Radio Interface ............................................................................................................................................99
Configuring Internal Wireless LAN Settings........................................................................................................................101
Configuring the Guest Network Wireless Settings ..............................................................................................................102

Chapter 10: Configuring Security ...................................................................................................................................103
Understanding Security Issues on Wireless Networks ......................................................................................................104

How Do I Know Which Security Mode to Use?............................................................................................................104
Comparison of Security Modes for Key Management, Authentication and Encryption Algorithms .............................105

When to Use Plain Text........................................................................................................................................105
When to Use Static WEP .....................................................................................................................................105