Dell PowerConnect W-IAP92 Dell Instant 6.1.3.4-3.1.0.0 User Guide - Page 27

WIP, VPN,

Page 27 highlights

Users for Internal Server- Use this window to populate the system's internal authentication server with users. This list will be used by networks for which per-user authorization is specified using the Virtual Controller's internal authentication server. For more information about users, see Chapter 28, "User Database" . Roles- This window displays all the roles defined for all the Networks and the Access Rules lists the permissions for each role. For more information, see "User Roles" on page 137. Blacklisting- Use this window to manually blacklist clients. See "Client Blacklisting" on page 223 for more information. PEF Settings- Use this window to enable/disable gateway filters supporting address and port translation for various protocols. See Chapter 26, "Policy Enforcement Firewall" on page 219 for more information. WIP WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless threats. Use this window to specify standard levels of threat detection. See "Wireless Intrusion Protection (WIP)" on page 165 for more information. Figure 14 WIP VPN Use this window to define how to communicate with the remote controller. See Chapter 27, "VPN Configuration" on page 227 for more information. Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User Guide Instant User Interface | 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0
| User Guide
Instant User Interface
|
27
Users for Internal Server
— Use this window to populate the system’s internal authentication server with users.
This list will be used by networks for which per-user authorization is specified using the Virtual Controller’s
internal authentication server. For more information about users, see
Chapter 28, “User Database”
.
Roles—
This window
displays all the roles defined for all the Networks and the
Access Rules
lists the permissions
for each role. For more information, see
“User Roles” on page
137
.
Blacklisting
— Use this window to manually blacklist clients. See
“Client Blacklisting” on page
223
for more
information.
PEF Settings
— Use this window to enable/disable gateway filters supporting address and port translation for
various protocols. See
Chapter 26, “Policy Enforcement Firewall” on page
219
for more information.
WIP
WIP offers a wide selection of intrusion detection and protection features to protect the network against wireless
threats. Use this window to specify standard levels of threat detection. See
“Wireless Intrusion Protection (WIP)”
on page
165
for more information.
Figure 14
WIP
VPN
Use this window to define how to communicate with the remote controller. See
Chapter 27, “VPN
Configuration” on page
227
for more information.