Brocade Mobility 5181 Access Point Product Reference Guide (Supporting software release 4.4.0.0) User Manual

Page 6

Advertising
background image

vi

Brocade Mobility 5181 Access Point Product Reference Guide

53-1002516-01

Chapter 5

Network Management

Configuring the LAN interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

Configuring VLAN support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95
Configuring LAN1 and LAN2 settings . . . . . . . . . . . . . . . . . . . . . 97

Configuring WAN settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101

Configuring Network Address Translation (NAT) settings . . . .103
Configuring dynamic DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105

Enabling wireless LANs (WLANs) . . . . . . . . . . . . . . . . . . . . . . . . . . .106

Creating/editing individual WLANs . . . . . . . . . . . . . . . . . . . . . .107
Setting the WLAN’s radio configuration . . . . . . . . . . . . . . . . . .118
Configuring bandwidth management settings. . . . . . . . . . . . .126

Configuring WIPS server settings. . . . . . . . . . . . . . . . . . . . . . . . . . .127

Configuring router settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .128

Setting the RIP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . .129

Chapter 6

Configuring Access Point Security

Configuring security options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132

Setting passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .132

Resetting the access point password. . . . . . . . . . . . . . . . . . . .133

Enabling authentication and encryption schemes . . . . . . . . . . . . .134

Configuring Kerberos authentication. . . . . . . . . . . . . . . . . . . . . . . .136

Configuring 802.1x EAP authentication. . . . . . . . . . . . . . . . . . . . . .137

Configuring WEP encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140

Configuring KeyGuard encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 141

Configuring WPA/WPA2 using TKIP . . . . . . . . . . . . . . . . . . . . . . . . .142

Configuring WPA2-CCMP (802.11i) . . . . . . . . . . . . . . . . . . . . . . . . .144

Configuring firewall settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146

Configuring LAN to WAN access . . . . . . . . . . . . . . . . . . . . . . . . 147
Configuring advanced subnet access. . . . . . . . . . . . . . . . . . . .150

Configuring VPN tunnels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151

Configuring manual key settings. . . . . . . . . . . . . . . . . . . . . . . .153
Configuring auto key settings . . . . . . . . . . . . . . . . . . . . . . . . . .156
Configuring IKE key settings . . . . . . . . . . . . . . . . . . . . . . . . . . .157
Viewing VPN status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159

Configuring content filtering settings. . . . . . . . . . . . . . . . . . . . . . . .160

Configuring rogue AP detection . . . . . . . . . . . . . . . . . . . . . . . . . . . .162

Moving rogue APs to the allowed AP list. . . . . . . . . . . . . . . . . .164
Using clients to detect rogue devices . . . . . . . . . . . . . . . . . . . .166

Advertising