Allied Telesis AT-WA7400/EU User Manual
Page 6

Contents
6
Security Considerations Related to WDS Bridges.......................................................................................................173
WDS Guidelines ..........................................................................................................................................................174
Chapter 17: Maintenance and Monitoring .....................................................................................................................181
Monitoring Wired and Wireless LAN Settings .....................................................................................................................182
Viewing the Event Logs ......................................................................................................................................................184
Setting Up the Log Relay Host .............................................................................................................................185
Enabling or Disabling the Log Relay Host............................................................................................................186
Viewing the Transmit/Receive Statistics .............................................................................................................................188
Viewing the Associated Wireless Clients ............................................................................................................................190
Viewing the Status of Neighboring Access Points ..............................................................................................................191
Viewing System Information ...............................................................................................................................................195
Setting the Administrator Password....................................................................................................................................197
Enabling the Network Time Protocol (NTP) Server ............................................................................................................200
Setting the HTTP Timeout ..................................................................................................................................................202
Rebooting the Access Point................................................................................................................................................203
Resetting the Configuration to Factory Defaults .................................................................................................................204
Upgrading the Firmware .....................................................................................................................................................205
Chapter 18: Backing Up and Restoring a Configuration ..............................................................................................209
Backing up the Configuration Settings for an Access Point................................................................................................210
Restoring Access Point Settings to a Previous Configuration ............................................................................................211
Appendix A: Management Software Default Settings ..................................................................................................213
Appendix B: Configuring Security on Wireless Clients ...............................................................................................215
Network Infrastructure and Choosing Between the Built-in or External Authentication Server...........................................217
Make Sure the Wireless Client Software is Up to Date.......................................................................................................218
Accessing the Microsoft Windows Wireless Client Security Settings .................................................................................219
Configuring a Client to Access an Unsecure Network (Plain Text mode)....................................................................221
Configuring Static WEP Security on a Client...............................................................................................................222
IEEE 802.1x Client Using EAP/PEAP ..................................................................................................................225
IEEE 802.1x Client Using EAP/TLS Certificate ....................................................................................................229
WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP........................................................................................234
WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate .........................................................................239
Configuring WPA/WPA2 Personal (PSK) Security on a Client ...........................................................................................243
Configuring an External RADIUS Server to Recognize the AT-WA7400 Wireless Access Point .......................................246
Obtaining a TLS-EAP Certificate for a Client ......................................................................................................................251
Appendix C: Troubleshooting ........................................................................................................................................257
Wireless Distribution System (WDS) Problems and Solutions ...........................................................................................258
Cluster Recovery ................................................................................................................................................................259
Appendix D: Command Line Interface (CLI) for Access Point Configuration ............................................................263
Comparison of Settings Configurable with the CLI and Web UI .........................................................................................264
Accessing the CLI for an Access Point ...............................................................................................................................267