Netgear WC7600 Reference Manual - Page 31

Management VLAN and Data VLAN Strategies

Page 31 highlights

ProSAFE Wireless Controller WC7600 Step Configuration Web management interface path 3. Configure the slave wireless controllers and deploy them in the network. For each slave wireless controller, configure up to eight access point profile groups, and for each access point profile in a group, do at least the following: 1. Configure an SSID for wireless access. 2. Configure the network authentication and data encryption. Configuration > Profile > Advanced 3. Assign the VLAN. 4. If necessary for the selected network authentication option, Configuration > Security > configure the authentication server. Advanced > Authentication Server 4. Interconnect the wireless controllers that you intend to make members of the stack. The connection must be a wired connection but does not need to be a direct connection, that is, a switch or router can be located in between the wireless controllers that are part of a stack. 5. Configure the stacking group on the wireless controller that you Stacking > Stacking intend as the master controller. 6. Synchronize all wireless controllers that are members of the stack. Management VLAN and Data VLAN Strategies If your network includes ten or more access points, NETGEAR recommends that you set up at least two VLAN groups: a management VLAN group and a data VLAN group. If your network is large, you should create a number of data VLAN groups. Setting up data VLANs for clients allows you to: • Segregate traffic by user category • Create different policies such as access policies that are based on user category System Planning and Deployment Scenarios 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307

System Planning and Deployment Scenarios
31
ProSAFE Wireless Controller WC7600
Management VLAN and Data VLAN Strategies
If your network includes ten or more access points, NETGEAR recommends that you set up
at least two VLAN groups: a management VLAN group and a data VLAN group. If your
network is large, you should create a number of data VLAN groups. Setting up data VLANs
for clients allows you to:
Segregate traffic by user category
Create different policies such as access policies that are based on user category
3.
Configure the slave wireless controllers and deploy them in the
network.
For each slave wireless controller, configure up to eight access
point profile
groups
, and for each access point profile in a group, do
at least the following:
1.
Configure an SSID for wireless access.
Configuration > Profile > Advanced
2.
Configure the network authentication and data encryption.
3.
Assign the VLAN.
4.
If necessary for the selected network authentication option,
configure the authentication server.
Configuration > Security >
Advanced > Authentication Server
4.
Interconnect the wireless controllers that you intend to make
members of the stack. The connection must be a wired
connection but does not need to be a direct connection, that is, a
switch or router can be located in between the wireless
controllers that are part of a stack.
5.
Configure the stacking group on the wireless controller that you
intend as the master controller.
Stacking > Stacking
6.
Synchronize all wireless controllers that are members of the
stack.
Step
Configuration
Web management interface path