Table of Contents
iii
5.2.6.4 IGMP Snooping .......................................................................................................................................5-70
5.2.6.5 Quality of Service (QoS) ..........................................................................................................................5-72
5.2.6.6 Spanning Tree Configuration ..................................................................................................................5-74
5.2.6.7 Routing ....................................................................................................................................................5-77
5.2.6.8 Dynamic Routing (OSPF) ..........................................................................................................................5-79
5.2.6.9 Forwarding Database ..............................................................................................................................5-86
5.2.6.10 Bridge VLAN ..........................................................................................................................................5-88
5.2.6.11 Cisco Discovery Protocol Configuration ................................................................................................5-93
5.2.6.12 Link Layer Discovery Protocol Configuration ........................................................................................5-94
5.2.6.13 Miscellaneous Network Configuration .................................................................................................5-95
5.2.6.14 Alias ......................................................................................................................................................5-96
5.2.6.15 Profile Network Configuration and Deployment Considerations .......................................................5-104
5.2.7 Profile Security Configuration .........................................................................................................................5-105
5.2.7.1 Defining Profile VPN Settings ...............................................................................................................5-106
5.2.7.2 Auto IPSec Tunnel .................................................................................................................................5-122
5.2.7.3 Defining Profile Security Settings .........................................................................................................5-123
5.2.7.4 Setting the Certificate Revocation List (CRL) Configuration .................................................................5-124
5.2.7.5 Setting the Profile’s NAT Configuration ...............................................................................................5-125
5.2.7.6 Setting the Profile’s Bridge NAT Configuration ....................................................................................5-134
5.2.7.7 Profile Security Configuration and Deployment Considerations ..........................................................5-136
5.2.8 Virtual Router Redundancy Protocol (VRRP) Configuration ............................................................................5-137
5.2.9 Profile Critical Resources ................................................................................................................................5-141
5.2.10 Profile Services Configuration ......................................................................................................................5-144
5.2.10.1 Profile Services Configuration and Deployment Considerations ........................................................5-145
5.2.11 Profile Management Configuration ..............................................................................................................5-146
5.2.11.1 Upgrading AP6532 Firmware from 5.1 ................................................................................................5-151
5.2.11.2 Profile Management Configuration and Deployment Considerations ................................................5-151
5.2.12 Mesh Point Configuration .............................................................................................................................5-152
5.2.12.1 Vehicle Mounted Modem (VMM) Deployment Consideration ...........................................................5-159
5.2.13 Advanced Profile Configuration ....................................................................................................................5-160
5.2.13.1 Advanced Profile Client Load Balancing .............................................................................................5-161
5.2.13.2 Configuring MINT Protocol .................................................................................................................5-165
5.2.13.3 Advanced Profile Miscellaneous Configuration .................................................................................5-170
5.2.14 Environmental Sensor Configuration ............................................................................................................5-171
5.3 Managing Virtual Controllers ...................................................................................................................................5-174
5.4 Overriding a Device Configuration ...........................................................................................................................5-176
5.4.1 Basic Configuration .........................................................................................................................................5-176
5.4.2 Certificate Management .................................................................................................................................5-178
5.4.2.1 Manage Certificates .............................................................................................................................5-180
5.4.3 RF Domain Overrides ......................................................................................................................................5-193
5.4.4 Wired 802.1X Overrides ..................................................................................................................................5-195
5.4.5 Device Overrides .............................................................................................................................................5-196
5.4.5.1 Radio Power Overrides ..........................................................................................................................5-198
5.4.5.2 Adoption Overrides ...............................................................................................................................5-200
5.4.5.3 Profile Interface Override Configuration ...............................................................................................5-203
5.4.5.4 Overriding the Network Configuration ..................................................................................................5-237
5.4.5.5 Overriding a Security Configuration ......................................................................................................5-282
Summary of Contents for AP-7131 Series
Page 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Page 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Page 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Page 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Page 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Page 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Page 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Page 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Page 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Page 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Page 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Page 953: ......