Netgear WC7520 WC7520 Reference Manual - Page 5

Configuring Security and Wireless Security Profiles, Maintaining the Controller - wireless controller

Page 5 highlights

ProSafe 20-AP Wireless Controller WC7520 Reference Manual Chapter 8 Configuring Security and Wireless Security Profiles Managing Wireless Security Profiles 83 Small-Scale WLAN Networks 84 Larger Deployments 84 Configuring Basic Security Profiles 85 Configuring Advanced Security Profiles for Access Point Groups . . . . . 87 Managing Rogue Access Points 89 Configuring Basic Rogue Detection Settings 89 Configuring Advanced Rogue Detection Settings 90 Managing MAC Authentication and MAC Authentication Groups 92 Configuring Basic MAC Authentication Settings 93 Configuring MAC Authentication Settings for Groups 94 Managing Authentication Servers and Authentication Server Groups . . . . 95 Configuring Basic Authentication Server Settings 96 Configuring Advanced Authentication Server Settings for Groups. . . . . 97 Managing Guest Network Access 98 Configuring Captive Portal Settings 98 Managing Users and Passwords 100 Chapter 9 Maintaining the Controller Managing the Configuration File 101 Backing Up and Restoring the Configuration File 102 Upgrading the Configuration File 103 Rebooting or Resetting the Wireless Controller 105 Rebooting Access Points 107 Managing External Storage 107 Managing Remote Access 108 Specifying Session Timeouts 110 Viewing Alerts and Events and Saving Logs 110 Saving Logs 111 Viewing Alerts and Events 111 Managing Licenses 115 Viewing Your Licenses 116 Configuring the License Server Settings 117 Registering Your Licenses 118 Chapter 10 Managing Stacking and Redundancy Managing Stacking 119 Configuring Stacking 120 Controller Selection Menu 121 Managing Redundancy 121 Configuring Redundancy 122 Table of Contents | 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

ProSafe 20-AP Wireless Controller WC7520 Reference Manual
Table of Contents
|
5
Chapter 8
Configuring Security and Wireless Security Profiles
Managing Wireless Security Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Small-Scale WLAN Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
Larger Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Configuring Basic Security Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
Configuring Advanced Security Profiles for Access Point Groups . . . . . 87
Managing Rogue Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
Configuring Basic Rogue Detection Settings . . . . . . . . . . . . . . . . . . . . .89
Configuring Advanced Rogue Detection Settings . . . . . . . . . . . . . . . . .90
Managing MAC Authentication and MAC Authentication Groups . . . . . . .92
Configuring Basic MAC Authentication Settings. . . . . . . . . . . . . . . . . . .93
Configuring MAC Authentication Settings for Groups . . . . . . . . . . . . . .94
Managing Authentication Servers and Authentication Server Groups . . . . 95
Configuring Basic Authentication Server Settings . . . . . . . . . . . . . . . . .96
Configuring Advanced Authentication Server Settings for Groups. . . . . 97
Managing Guest Network Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Configuring Captive Portal Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Managing Users and Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100
Chapter 9
Maintaining the Controller
Managing the Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .101
Backing Up and Restoring the Configuration File. . . . . . . . . . . . . . . . .102
Upgrading the Configuration File . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
Rebooting or Resetting the Wireless Controller . . . . . . . . . . . . . . . . . . . . 105
Rebooting Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Managing External Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107
Managing Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Specifying Session Timeouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Viewing Alerts and Events and Saving Logs . . . . . . . . . . . . . . . . . . . . . .110
Saving Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Viewing Alerts and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
Managing Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .115
Viewing Your Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Configuring the License Server Settings . . . . . . . . . . . . . . . . . . . . . . .117
Registering Your Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .118
Chapter 10
Managing Stacking and Redundancy
Managing Stacking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
Configuring Stacking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120
Controller Selection Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Managing Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Configuring Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122