Organization – Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual

Page 18

Advertising
background image

18

Rockwell Automation Publication 1783-UM006A-EN-P - May 2014

Preface

Organization

This user manual is organized into these sections.

Item

Description

Chapter 1 Getting Started with the Stratix 5100 WAP

Provides an overview of the Stratix 5100 Wireless Access Point/Workgroup Bridge, including it’s features and network
configuration

Chapter 2 Install the Stratix 5100 Wireless Access Point/
Workgroup Bridge

Provides details on how to install the access point.

Chapter 3 Stratix 5100 Device Manager Configuration
Startup

Describes how to use the web browser interface to configure the access point.

Chapter 5 Configure the Stratix 5100 WAP Using the
Command-Line Interface

Describes how to use the command-line interface (CLI) to configure the access point.

Chapter 6 Administering the WAP Access

Describes how to perform one-time operations to administer your access point, such as preventing unauthorized access
to the access point, setting the system date and time, and setting the system name and prompt.

Chapter 7 Configuring Radio Settings

Describes how to configure settings for the access point radio such as the role in the radio network, transmit power,
channel settings, and others.

Chapter 8 Configuring Multiple SSIDs

Describes how to configure and manage multiple service set identifiers (SSIDs) and multiple basic SSIDs (BSSIDs) on your
access point. You can configure up to 16 SSIDs and up to eight BSSIDs on your access point.

Chapter 9 Configuring Spanning Tree Protocol

Describes how to configure Spanning Tree Protocol (STP) on your access point, bridge, or access point operating in a
bridge mode. STP prevents bridge loops from occurring in your network.

Chapter 10 Configure an Access Point as a Local
Authenticator

Describes how to configure the access point to act as a local RADIUS server for your wireless LAN. If the WAN connection
to your main RADIUS server fails, the access point acts as a back-up server to authenticate wireless devices.

Chapter 11 Configuring Cipher Suites and WEP

Describes how to configure the cipher suites required to use authenticated key management, Wired Equivalent Privacy
(WEP), and WEP features including MIC, CMIC, TKIP, CKIP, and broadcast key rotation.

Chapter 12 Configuring Authentication Types

Describes how to configure authentication types on the access point. Client devices use these authentication methods to
join your network.

Chapter 13 Configuring WDS, Fast Secure Roaming, Radio
Management, and Wireless Intrusion Detection Services

Describes how to configure the access point to participate in WDS, to allow fast reassociation of roaming client services,
and to participate in radio management.

Chapter 14 Configuring RADIUS and TACACS+ Servers

Describes how to enable and configure the RADIUS and Terminal Access Controller Access Control System Plus (TACACS+),
that provides detailed accounting information and flexible administrative control over authentication and authorization
processes.

Chapter 15 Configuring VLANs

Describes how to configure your access point to interoperate with the VLANs set up on your wired LAN.

Chapter 16 Configuring QoS

Describes how to configure and manage MAC address, IP, and Ethertype filters on the access point by using the web
browser interface.

Chapter 17 Configuring Filters

Describes how to configure and manage MAC address, IP, and Ethernet type filters on the access point by using the web
browser interface.

Chapter 18 Configuring CDP

Describes how to configure Cisco Discovery Protocol (CDP) on your access point. CDP is a device-discovery protocol that
runs on all Cisco network equipment.

Chapter 19 Configuring SNMP

Describes how to configure the Simple Network Management Protocol (SNMP) on your access point.

Chapter 20 Configuring Repeater and Standby Access
Points and Workgroup Bridge Mode

Describes how to configure your access point as a hot standby unit or as a repeater unit.

Chapter 21 Configuring System Message Logging

Describes how to configure system message logging on your access point.

Chapter 22 Troubleshooting

Provides troubleshooting procedures for basic problems with the access point.

Appendix A Protocol Filters

Lists some of the protocols that you can filter on the access point.

Appendix B Supported MIBs

Lists the Simple Network Management Protocol (SNMP) Management Information Bases (MIBs) that the access point
supports for this software release.

Appendix C Error and Event Messages

Lists the CLI error and event messages and provides an explanation and recommended action for each message.

Advertising