beautypg.com

Allied Telesis AT-WA7400/EU User Manual

Page 6

background image

Contents

6

Security Considerations Related to WDS Bridges.......................................................................................................173
WDS Guidelines ..........................................................................................................................................................174

Configuring WDS Settings ..................................................................................................................................................176

Example of Configuring a WDS Link ...........................................................................................................................179

Chapter 17: Maintenance and Monitoring .....................................................................................................................181
Monitoring Wired and Wireless LAN Settings .....................................................................................................................182
Viewing the Event Logs ......................................................................................................................................................184

Log Relay Host for Kernel Messages ..........................................................................................................................185

Setting Up the Log Relay Host .............................................................................................................................185
Enabling or Disabling the Log Relay Host............................................................................................................186

Events Log...................................................................................................................................................................186

Viewing the Transmit/Receive Statistics .............................................................................................................................188
Viewing the Associated Wireless Clients ............................................................................................................................190

Link Integrity Monitoring ..............................................................................................................................................190
What is the Difference Between an Association and a Session? ................................................................................190

Viewing the Status of Neighboring Access Points ..............................................................................................................191
Viewing System Information ...............................................................................................................................................195
Setting the Administrator Password....................................................................................................................................197
Enabling the Network Time Protocol (NTP) Server ............................................................................................................200
Setting the HTTP Timeout ..................................................................................................................................................202
Rebooting the Access Point................................................................................................................................................203
Resetting the Configuration to Factory Defaults .................................................................................................................204
Upgrading the Firmware .....................................................................................................................................................205

Verifying the Firmware Upgrade..................................................................................................................................206

SNMP Firmware Upgrade...................................................................................................................................................207

Chapter 18: Backing Up and Restoring a Configuration ..............................................................................................209
Backing up the Configuration Settings for an Access Point................................................................................................210
Restoring Access Point Settings to a Previous Configuration ............................................................................................211

Appendix A: Management Software Default Settings ..................................................................................................213

Appendix B: Configuring Security on Wireless Clients ...............................................................................................215
Network Infrastructure and Choosing Between the Built-in or External Authentication Server...........................................217

I Want to Use the Built-in Authentication Server (EAP-PEAP) ....................................................................................217
I Want to Use an External RADIUS Server with EAP-TLS Certificates or EAP-PEAP ................................................217

Make Sure the Wireless Client Software is Up to Date.......................................................................................................218
Accessing the Microsoft Windows Wireless Client Security Settings .................................................................................219

Configuring a Client to Access an Unsecure Network (Plain Text mode)....................................................................221
Configuring Static WEP Security on a Client...............................................................................................................222

Connecting to the Wireless Network with a Static WEP Client.............................................................................224

Configuring IEEE 802.1x Security on a Client .............................................................................................................225

IEEE 802.1x Client Using EAP/PEAP ..................................................................................................................225
IEEE 802.1x Client Using EAP/TLS Certificate ....................................................................................................229

Configuring WPA/WPA2 Enterprise (RADIUS) Security on a Client...................................................................................234

WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP........................................................................................234
WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate .........................................................................239

Configuring WPA/WPA2 Personal (PSK) Security on a Client ...........................................................................................243
Configuring an External RADIUS Server to Recognize the AT-WA7400 Wireless Access Point .......................................246
Obtaining a TLS-EAP Certificate for a Client ......................................................................................................................251

Appendix C: Troubleshooting ........................................................................................................................................257
Wireless Distribution System (WDS) Problems and Solutions ...........................................................................................258
Cluster Recovery ................................................................................................................................................................259

Reboot or Reset the Access Point...............................................................................................................................259
Stop Clustering and Reset Each Access Point in the Cluster......................................................................................259

Appendix D: Command Line Interface (CLI) for Access Point Configuration ............................................................263
Comparison of Settings Configurable with the CLI and Web UI .........................................................................................264
Accessing the CLI for an Access Point ...............................................................................................................................267

Telnet Connection to the Access Point........................................................................................................................267