beautypg.com

H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 13

background image

vii

30 AP Configuration ...................................................................................................................................30-1

Overview ...............................................................................................................................................30-1

Introduction to CAPWAP ...............................................................................................................30-1

Configuring Auto AP ......................................................................................................................30-2

Configuring AP Group ...................................................................................................................30-2

Configuring an AP .................................................................................................................................30-2

AP Setup .......................................................................................................................................30-2

Configuring Auto AP ......................................................................................................................30-5

Configuring an AP Group ..............................................................................................................30-7

31 Access Service Configuration..............................................................................................................31-1

Access Service Overview .....................................................................................................................31-1

Terminology...................................................................................................................................31-1

Client Access.................................................................................................................................31-2

WLAN Data Security......................................................................................................................31-5

Client Access Authentication .........................................................................................................31-6

802.11n..........................................................................................................................................31-8

Configuring Access Service ..................................................................................................................31-9

Creating a WLAN Service..............................................................................................................31-9

Configuring Clear Type Wireless Service......................................................................................31-9

Configuring Crypto Type Wireless Service..................................................................................31-17

Security Parameter Dependencies..............................................................................................31-22

Binding an AP Radio to a Wireless Service ................................................................................31-23

Displaying the Detailed Information of a Wireless Service..........................................................31-25

Wireless Access Configuration Examples ..........................................................................................31-27

Wireless Service Configuration Example ....................................................................................31-27

Auto AP Configuration Example..................................................................................................31-30

802.11n Configuration Example ..................................................................................................31-35

WPA-PSK Authentication Configuration Example ......................................................................31-36

Local MAC Authentication Configuration Example .....................................................................31-39

Dynamic WEP Encryption-802.1X Authentication Configuration Example .................................31-43

32 Mesh Service Configuration .................................................................................................................32-1

Mesh Service Overview ........................................................................................................................32-1

Basic Concepts in WLAN Mesh ....................................................................................................32-1

Advantages of WLAN Mesh ..........................................................................................................32-2

Deployment Scenarios ..................................................................................................................32-2

WLAN Mesh Security ....................................................................................................................32-5

Mobile Link Switch Protocol ..........................................................................................................32-6

Mesh Network Topologies .............................................................................................................32-7

Configuring Mesh Service .....................................................................................................................32-8

Configuring Mesh Service .............................................................................................................32-8

Configuring a Mesh Policy...........................................................................................................32-12

Mesh Global Setup ......................................................................................................................32-17

Configuring a Working Channel ..................................................................................................32-17

Enabling Radio ............................................................................................................................32-18

Configuring a Peer MAC Address ...............................................................................................32-18