Table of Contents
iii
5.6.1 Certificate Management ........................................................................................................................................... 5-164
5.6.2 RSA Key Management .............................................................................................................................................. 5-172
5.6.3 Certificate Creation ................................................................................................................................................... 5-176
5.6.4 Generating a Certificate Signing Request ................................................................................................................ 5-178
5.7 RF Domain Overrides ........................................................................................................................................................... 5-181
5.8 Profile Overrides .................................................................................................................................................................. 5-184
5.9 Radio Power Overrides ........................................................................................................................................................ 5-187
5.10 Adoption Overrides ............................................................................................................................................................ 5-189
5.10.1.1 Ethernet Port Override Configuration ........................................................................................................... 5-192
5.10.1.2 Virtual Interface Override Configuration ...................................................................................................... 5-199
5.10.1.3 Radio Override Configuration ....................................................................................................................... 5-204
5.10.1.4 WAN Backhaul Overrides ............................................................................................................................ 5-214
5.10.2.1 Overriding the DNS Configuration ................................................................................................................ 5-217
5.10.2.2 Overriding an ARP Configuration .................................................................................................................. 5-219
5.10.2.3 Overriding a L2TPv3 Profile Configuration ................................................................................................... 5-221
5.10.2.4 Overriding an IGMP Snooping Configuration ............................................................................................... 5-230
5.10.2.5 Overriding a Quality of Service (QoS) Configuration .................................................................................... 5-232
5.10.2.6 Overriding a Spanning Tree Configuration ................................................................................................... 5-234
5.10.2.7 Overriding a Routing Configuration .............................................................................................................. 5-237
5.10.2.8 Overriding a Dynamic Routing (OSPF) Configuration ................................................................................... 5-240
5.10.2.9 Overriding a Forwarding Database Configuration ........................................................................................ 5-250
5.10.2.10 Overriding a Bridge VLAN Configuration .................................................................................................... 5-252
5.10.2.11 Overriding a Cisco Discovery Protocol Configuration ................................................................................. 5-256
5.10.2.12 Overriding a Link Layer Discovery Protocol Configuration ......................................................................... 5-257
5.10.2.13 Overriding a Miscellaneous Network Configuration .................................................................................. 5-259
5.10.3.1 Overriding General Security Settings ........................................................................................................... 5-261
5.10.3.2 Overriding a Certificate Revocation List (CRL) Configuration ...................................................................... 5-262
5.10.3.3 Overriding a Profile’s NAT Configuration ..................................................................................................... 5-264
5.10.4 Overriding a Services Configuration ....................................................................................................................... 5-273
5.10.5 Overriding a Management Configuration ............................................................................................................... 5-274
5.10.6 Overriding an Advanced Configuration ................................................................................................................... 5-279
Chapter 6 Wireless Configuration
6.1.2.1 802.1x EAP, EAP PSK and EAP MAC .................................................................................................................. 6-9
6.1.2.2 MAC Authentication ......................................................................................................................................... 6-11
6.1.2.3 PSK / None ....................................................................................................................................................... 6-12
6.1.2.4 Captive Portal ................................................................................................................................................... 6-13
6.1.2.5 WPA/WPA2-TKIP .............................................................................................................................................. 6-14
6.1.2.6 WPA2-CCMP ..................................................................................................................................................... 6-18
6.1.2.7 WEP 64 ............................................................................................................................................................. 6-22
6.1.2.8 WEP 128 and KeyGuard.................................................................................................................................... 6-25
Содержание WiNG 5
Страница 1: ...Motorola Solutions WiNG 5 Access Point System Reference Guide ...
Страница 2: ......
Страница 10: ...viii WiNG 5 Access Point System Reference Guide ...
Страница 16: ...1 4 WiNG 5 Access Point System Reference Guide ...
Страница 28: ...2 12 WiNG 5 Access Point System Reference Guide ...
Страница 48: ...3 20 WiNG 5 Access Point System Reference Guide ...
Страница 197: ...Device Configuration 5 137 Figure 5 78 Profile Management Settings screen ...
Страница 335: ...Device Configuration 5 275 Figure 5 155 Profile Overrides Management Settings screen ...
Страница 348: ...5 288 WiNG 5 Access Point System Reference Guide ...
Страница 350: ...6 2 WiNG 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless ...
Страница 448: ...6 100 WiNG 5 Access Point System Reference Guide ...
Страница 492: ...8 32 WiNG 5 Access Point System Reference Guide ...
Страница 538: ...9 46 WiNG 5 Access Point System Reference Guide ...
Страница 564: ...11 10 WiNG 5 Access Point System Reference Guide ...
Страница 606: ...12 42 WiNG 5 Access Point System Reference Guide ...
Страница 732: ...13 126WiNG 5 Access Point System Reference Guide Figure 13 67 Access Point Certificate Trustpoint screen ...
Страница 762: ...A 2 WiNG 5 Access Point System Reference Guide ...
Страница 801: ......