Netgear WC7520 WC7520 Reference Manual - Page 14

Centrally Manage the Wireless Settings for the Network, Organize the Network - captive portal

Page 14 highlights

ProSafe 20-AP Wireless Controller WC7520 Reference Manual • Upgrade access point firmware. Update and synchronize new firmware versions to all managed access points in the network. For more information, see Chapter 4, Access Point Discovery and Management. Centrally Manage the Wireless Settings for the Network • Schedule the radios. Schedule the entire network to go offline or schedule access point profile groups to go offline. • Manage wireless settings and channel allocation. Manage the wireless settings such as wireless mode, data rate, channel width, and so on, for the entire network or for access point profile groups, and manage channel allocation for the entire network. • Manage QoS settings. Manage QoS queue settings for data, background, video. and voice traffic for access point profile groups. • Configure RF management settings. Configure WLAN healing and wireless coverage hole detection for the entire network or for access point profile groups. For more information, see Chapter 7, Configuring Wireless Settings. Organize the Network • Create access point profiles. Organize access points in profiles to differentiate between SSIDs, client authentication, authentication settings, and wireless QoS settings. • Create access point profile groups. Organize access point profiles in access point profile groups to differentiate between buildings, floors, businesses or business divisions, and so on. Easily assign access points to profile groups or make changes to assignments. For more information, see Chapter 6, Managing Access Point Groups and Chapter 8, Configuring Security and Wireless Security Profiles. Centrally Manage Security in the Network • Manage secure access to the network and secure data transmission. Manage client authentication, encryption, wireless client security separation, and MAC authentication in access point profiles • Manage authentication servers for the network. Manage all internal and external authentication servers for the entire network or for access point profile groups. • Manage MAC authentication. Specify trusted and untrusted MAC addresses for the entire network. • Manage rogue access points. Manage rogue access points and their associated clients in the network. • Manage guest access. Manage guest access and captive portal access to the network. For more information, see Chapter 8, Configuring Security and Wireless Security Profiles. Chapter 1: Introduction and Overview | 14

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162

Chapter 1:
Introduction and Overview
|
14
ProSafe 20-AP Wireless Controller WC7520 Reference Manual
Upgrade access point firmware
. Update and synchronize new firmware versions to all
managed access points in the network.
For more information, see
Chapter 4, Access Point Discovery and Management
.
Centrally Manage the Wireless Settings for the Network
Schedule the radios
. Schedule the entire network to go offline or schedule access point
profile groups to go offline.
Manage wireless settings and channel allocation
. Manage the wireless settings such
as wireless mode, data rate, channel width, and so on, for the entire network or for
access point profile groups, and manage channel allocation for the entire network.
Manage QoS settings
. Manage QoS queue settings for data, background, video. and
voice traffic for access point profile groups.
Configure RF management settings
. Configure WLAN healing and wireless coverage
hole detection for the entire network or for access point profile groups.
For more information, see
Chapter 7, Configuring Wireless Settings
.
Organize the Network
Create access point profiles.
Organize access points in profiles to differentiate between
SSIDs, client authentication, authentication settings, and wireless QoS settings.
Create access point profile groups.
Organize access point profiles in access point
profile
groups
to differentiate between buildings, floors, businesses or business divisions,
and so on. Easily assign access points to profile groups or make changes to
assignments.
For more information, see
Chapter 6, Managing Access Point Groups
and
Chapter 8,
Configuring Security and Wireless Security Profiles
.
Centrally Manage Security in the Network
Manage secure access to the network and secure data transmission
. Manage client
authentication, encryption, wireless client security separation, and MAC authentication in
access point profiles
Manage authentication servers for the network
. Manage all internal and external
authentication servers for the entire network or for access point profile groups.
Manage MAC authentication
. Specify trusted and untrusted MAC addresses for the
entire network.
Manage rogue access points
. Manage rogue access points and their associated clients
in the network.
Manage guest access
. Manage guest access and captive portal access to the network.
For more information, see
Chapter 8, Configuring Security and Wireless Security Profiles
.