4-61
Security
system” and “shared key.” Open-system authentication accepts any client
attempting to connect to the access point without verifying its identity. The
shared-key approach uses Wired Equivalent Privacy (WEP) to verify client
identity by distributing a shared key to stations before attempting
authentication.
Associated: Shows if the station has been successfully associated with the
access point. Once authentication is completed, stations can associate with
the current access point, or reassociate with a new access point. The
association procedure allows the wireless system to track the location of each
mobile client, and ensure that frames destined for each client are forwarded to
the appropriate access point.
Forwarding Allowed: Shows if the station has passed 802.1X authentication
and is now allowed to forward traffic to the access point.
Key Type – Displays one of the following:
• WEP Disabled – The client is not using Wired Equivalent Privacy (WEP)
encryption keys.
• Dynamic – The client is using Wi-Fi Protected Access (802.1X or pre-shared
key mode) or using 802.1X authentication with dynamic keying.
• Static – The client is using static WEP keys for encryption.
Event Logs
The Event Logs window shows the log messages generated by the access point
and stored in memory.
Figure 45
Event Logs
The Event Logs table displays the following information:
Log Time: The time the log message was generated.
Event Level: The logging level associated with this message. For a description of
the various levels, see “logging level” on page 4-33.
Event Message: The content of the log message.
Summary of Contents for 8760 - Wireless Dual Radio 11a/b/g PoE Access Point
Page 6: ...6 ...
Page 14: ...1 6 CHAPTER 1 INTRODUCTION ...
Page 40: ...3 12 CHAPTER 3 INITIAL CONFIGURATION ...
Page 68: ...4 28 CHAPTER 4 SYSTEM CONFIGURATION Figure 32 WDS and Spanning Tree Settings ...
Page 254: ...5 152 CHAPTER 5 COMMAND LINE INTERFACE ...
Page 258: ...6 4 CHAPTER 6 TROUBLESHOOTING ...