6
|
Contents
Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0
| User Guide
Connect
....................................................................................................................................
126
Creating a Web Login page in the Dell PowerConnect W-ClearPass GuestConnect
126
Configuring the RADIUS Server in Instant
.................................................................
126
MAC Authentication
.......................................................................................................................
127
Configuring MAC Authentication
.........................................................................................
127
Walled Garden Access
..................................................................................................................
128
Creating a Walled Garden Access
......................................................................................
128
Wired Authentication on an IAP
..................................................................................................
129
Certificates
......................................................................................................................................
129
Loading Certificates using Instant WebUI
.........................................................................
130
Loading Certificates using Dell PowrConnect W-AirWave
.............................................
131
Chapter 11
Encryption
.........................................................................................................................
135
Encryption Types Supported in Dell Instant
...............................................................................
135
WEP
..........................................................................................................................................
135
TKIP
...........................................................................................................................................
135
AES
............................................................................................................................................
135
Encryption Recommendations
.....................................................................................................
135
Understanding WPA and WPA2
..................................................................................................
136
Recommended Authentication and Encryption Combinations
.......................................
136
Chapter 12
Role Derivation
.................................................................................................................
137
User Roles
........................................................................................................................................
137
Creating a New User Role
.....................................................................................................
137
Creating Role Assignment Rules
..........................................................................................
138
DHCP Option and DHCP Fingerprinting
...............................................................................
139
802.1X-Authentication-Type
.................................................................................................
140
Chapter 13
User VLAN Derivation
.....................................................................................................
141
User VLAN Derivation
....................................................................................................................
141
Vendor Specific Attributes (VSA)
........................................................................................
141
VLAN Derivation Rule
............................................................................................................
142
Configuring VLAN Derivation Rules on an IAP
..........................................................
142
User Role
..................................................................................................................................
143
Configuring a User Role
................................................................................................
143
SSID Profile
.............................................................................................................................
145
Configuring VLAN Derivation Rules Using SSID Profile
..........................................
145
Chapter 14
Instant Firewall
................................................................................................................
147
Service Options
...............................................................................................................................
148
Destination Options
........................................................................................................................
149
Examples for Access Rules
..........................................................................................................
150
Allow TCP Service to a Particular Network
.......................................................................
150
Allow POP3 Service to a Particular Server
........................................................................
151
Deny FTP Service except to a Particular Server
...............................................................
152
Deny bootp Service except to a Particular Network
........................................................
153
Chapter 15
Content Filtering
...............................................................................................................
155
Enabling Content Filtering
.............................................................................................................
155
Enterprise Domains
........................................................................................................................
156
Chapter 16
OS Fingerprinting
.............................................................................................................
157