Allied Telesis AT-WA7400/EU User Manual
Page 6

Contents
6
Chapter 17: Maintenance and Monitoring .....................................................................................................................183
Monitoring Wired and Wireless LAN Settings .....................................................................................................................184
Viewing the Event Logs ......................................................................................................................................................186
Setting Up the Log Relay Host .............................................................................................................................187
Enabling or Disabling the Log Relay Host............................................................................................................188
Viewing the Transmit/Receive Statistics .............................................................................................................................190
Viewing the Associated Wireless Clients ............................................................................................................................192
Viewing the Status of Neighboring Access Points ..............................................................................................................193
Viewing System Information ...............................................................................................................................................197
Setting the Administrator Password....................................................................................................................................199
Enabling the Network Time Protocol (NTP) Server ............................................................................................................202
Setting the HTTP Timeout ..................................................................................................................................................204
Rebooting the Access Point................................................................................................................................................205
Resetting the Configuration to Factory Defaults .................................................................................................................206
Upgrading the Firmware .....................................................................................................................................................207
Chapter 18: Backing Up and Restoring a Configuration ..............................................................................................211
Backing up the Configuration Settings for an Access Point................................................................................................212
Restoring Access Point Settings to a Previous Configuration ............................................................................................213
Appendix A: Management Software Default Settings ..................................................................................................215
Appendix B: Configuring Security on Wireless Clients ...............................................................................................217
Network Infrastructure and Choosing Between the Built-in or External Authentication Server...........................................219
Make Sure the Wireless Client Software is Up to Date.......................................................................................................220
Accessing the Microsoft Windows Wireless Client Security Settings .................................................................................221
Configuring a Client to Access an Unsecure Network (Plain Text mode)....................................................................223
Configuring Static WEP Security on a Client...............................................................................................................224
IEEE 802.1x Client Using EAP/PEAP ..................................................................................................................227
IEEE 802.1x Client Using EAP/TLS Certificate ....................................................................................................231
WPA/WPA2 Enterprise (RADIUS) Client Using EAP/PEAP........................................................................................236
WPA/WPA2 Enterprise (RADIUS) Client Using EAP-TLS Certificate .........................................................................241
Configuring WPA/WPA2 Personal (PSK) Security on a Client ...........................................................................................245
Configuring an External RADIUS Server to Recognize the AT-WA7400 Wireless Access Point .......................................248
Obtaining a TLS-EAP Certificate for a Client ......................................................................................................................253
Appendix C: Troubleshooting ........................................................................................................................................259
Wireless Distribution System (WDS) Problems and Solutions ...........................................................................................260
Cluster Recovery ................................................................................................................................................................261
Appendix D: Command Line Interface (CLI) for Access Point Configuration ............................................................265
Comparison of Settings Configurable with the CLI and Web UI .........................................................................................266
Accessing the CLI for an Access Point ...............................................................................................................................269
Telnet Connection to the Access Point........................................................................................................................269
SSH Connection to the Access Point ..........................................................................................................................270