June 30, 2006
Confidential
Document Number BDTM10001-A05 Standard
BelAir100 User Guide
Detailed Table of Contents
Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Configuring Security for Wireless Clients . . . . . . . . . . . . . . . . . . . . . .59
Pre-Shared Key WEP Encryption . . . . . . . . . . . . . . . . . . . . . . .61
Managing RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
802.1X Authentication with WEP Encryption . . . . . . . . . . . . .64
WPA1 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .66
WPA2 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
Wireless Client Access Control List . . . . . . . . . . . . . . . . . . . .68
MAC Authorization Response Timeout . . . . . . . . . . . . . . . . .69
Configuring Security for Backhaul Links . . . . . . . . . . . . . . . . . . . . . . .69
Radios with Part Number B2CC033AA . . . . . . . . . . . . . . . . .69
All Other Backhaul Radios . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Controlling Inter-client Communication . . . . . . . . . . . . . . . . . . . . . . .71
Determining the MAC Address of the Internet gateway . . . .71
Disabling or Enabling Access Radio Wireless Bridging . . . . . .72
Disabling Inter-AP Wireless Client Communication . . . . . . . .72
Detecting Rogue Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Managing Access Radio SSIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Adding or Modifying an SSID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76
Managing Basic SSIDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Deleting a SSID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
Displaying the List of Available SSIDs . . . . . . . . . . . . . . . . . . . . . . . . . .78
Displaying the List of Associated Clients for a Given Access Radio SSID
79
Layer 2 Network Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . 82
BelAir100 Layer 2 Switch Port Assignment . . . . . . . . . . . . . . . . . . . . .82
Using Layer 2 Bridging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .82
Using Virtual LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
Configuring the IP Address of a VLAN . . . . . . . . . . . . . . . . . .84
Managing Egress Node Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85