Netgear WC7520 WC7520 Reference Manual - Page 83

Configuring Security and Wireless Security Profiles, Managing Wireless Security Profiles

Page 83 highlights

8. Configuring Security and Wireless Security Profiles 8 This chapter includes the following sections: • Managing Wireless Security Profiles on this page • Managing Rogue Access Points on page 89 • Managing MAC Authentication and MAC Authentication Groups on page 92 • Managing Authentication Servers and Authentication Server Groups on page 95 • Managing Guest Network Access on page 98 • Managing Users and Passwords on page 100 The wireless controller follows a configuration template called profile groups. Each access point at any instance operates using one profile group. A profile group includes all types of configuration that can be configured uniquely per access point, including 8 SSIDs per radio. The basic configuration menu selections cater to simple networks. In these screens, configuration applies to all the access points by default. There is no concept of different profile groups. The advanced menu selections cater to large and complex networks. Here you can create separate policies per profile group such as the wireless-on/off schedule for access points, channel allocation schedule. The SSIDs can be different per profile group. This allows the administrator of a complex network to fine-tune the configuration to meet requirements. It is important to know how to configure your network and decide which model fits better for your needs, basic or advanced. Once you follow one, it is easy to the use the same for all configuration pages. Managing Wireless Security Profiles Profiles are sets of configuration that can be applied to an access point. The configuration includes radio parameters, load balancing, and rate limit parameters. Each access point in managed mode is capable of supporting 8 profiles per radio. This means that the dual radio WNDAP350 access point can support 16 profiles in total. Setting up profiles allows you to configure the WLAN network offline. Then, when the WLAN network is up and running, you can push the configuration onto managed access points. You can configure profiles and profile groups without worrying about the state of the access Chapter 8: Configuring Security and Wireless Security Profiles | 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

Chapter 8:
Configuring Security and Wireless Security Profiles
|
83
8.
Configuring Security and Wireless
Security Profiles
8
This chapter includes the following sections:
Managing Wireless Security Profiles
on this page
Managing Rogue Access Points
on page 89
Managing MAC Authentication and MAC Authentication Groups
on page 92
Managing Authentication Servers and Authentication Server Groups
on page 95
Managing Guest Network Access
on page 98
Managing Users and Passwords
on page 100
The wireless controller follows a configuration template called profile groups. Each access
point at any instance operates using one profile group. A profile group includes all types of
configuration that can be configured uniquely per access point, including 8 SSIDs per radio.
The basic configuration menu selections cater to simple networks. In these screens,
configuration applies to all the access points by default. There is no concept of different
profile groups. The advanced menu selections cater to large and complex networks. Here
you can create separate policies per profile group such as the wireless-on/off schedule for
access points, channel allocation schedule. The SSIDs can be different per profile group.
This allows the administrator of a complex network to fine-tune the configuration to meet
requirements.
It is important to know how to configure your network and decide which model fits better for
your needs, basic or advanced. Once you follow one, it is easy to the use the same for all
configuration pages.
Managing Wireless Security Profiles
Profiles are sets of configuration that can be applied to an access point. The configuration
includes radio parameters, load balancing, and rate limit parameters. Each access point in
managed mode is capable of supporting 8 profiles per radio. This means that the dual radio
WNDAP350 access point can support 16 profiles in total.
Setting up profiles allows you to configure the WLAN network offline. Then, when the WLAN
network is up and running, you can push the configuration onto managed access points. You
can configure profiles and profile groups without worrying about the state of the access