Dell PowerConnect W-IAP92 Dell Instant 6.2.0.0-3.2.0.0 User Guide - Page 30

PEF, WIP, Rogue AP Detection and Classification

Page 30 highlights

PEF This link displays the following features. Figure 12 - PEF Authentication Servers- Use this window to configure an external RADIUS server for a wireless network. See "802.1X Authentication" on page 111 for more information. Users for Internal Server- Use this window to populate the system's internal authentication server with users. This list is used by networks for which per-user authorization is specified using the Virtual Controller's internal authentication server. For more information about users, see "User Database" on page 269. Roles- This window displays all the roles defined for all the Networks. The Access Rules part indicates the permissions for each role. For more information, see "User Roles" on page 145. Blacklisting- Use this window to manually blacklist clients. See "Client Blacklisting" on page 255 for more information. Policy Enforcement Firewell (PEF) Settings- Use this window to enable/disable Application Layer Gateway (ALG) supporting address and port translation for various protocols. See "Policy Enforcement Firewall" on page 251 for more information. WIP Wireless Intrusion Protection (WIP) offers a wide selection of intrusion detection and protection features to protect the network against wireless threats. Use this window to specify desired levels of threat detection. See "Rogue AP Detection and Classification" on page 177 for more information. 30 | Dell W-Instant User Interface Dell PowerConnect W-Series Instant Access Point 6.2.0.0-3.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296

30
|
Dell W-Instant User Interface
Dell PowerConnect W-Series Instant Access Point
6.2.0.0-3.2.0.0
|
User Guide
PEF
This link displays the following features.
Figure 12
- PEF
Authentication Servers
— Use this window to configure an external RADIUS server for a wireless
network. See
"802.1X Authentication" on page 111
for more information.
Users for Internal Server
— Use this window to populate the system’s internal authentication
server with users. This list is used by networks for which per-user authorization is specified using
the Virtual Controller’s internal authentication server. For more information about users, see
"User
Database" on page 269
.
Roles—
This window displays all the roles defined for all the Networks. The Access Rules part
indicates the permissions for each role. For more information, see
"User Roles" on page 145
.
Blacklisting
— Use this window to manually blacklist clients. See
"Client Blacklisting" on page 255
for more information.
Policy Enforcement Firewell (PEF) Settings
— Use this window to enable/disable Application
Layer Gateway (ALG) supporting address and port translation for various protocols. See
"Policy
Enforcement Firewall" on page 251
for more information.
WIP
Wireless Intrusion Protection (WIP) offers a wide selection of intrusion detection and protection
features to protect the network against wireless threats. Use this window to specify desired levels
of threat detection. See
"Rogue AP Detection and Classification" on page 177
for more
information.