Manual De UsuarioTabla de contenidos6.5 Configuring 802.1x EAP Authentication16.6 Configuring WEP Encryption66.7 Configuring KeyGuard Encryption86.8 Configuring WPA Using TKIP106.9 Configuring WPA2-CCMP (802.11i)126.10 Configuring Firewall Settings156.10.1 Configuring LAN to WAN Access176.10.1.1 Available Protocols206.10.2 Configuring Advanced Subnet Access216.11 Configuring VPN Tunnels236.11.1 Configuring Manual Key Settings276.11.2 Configuring Auto Key Settings316.11.3 Configuring IKE Key Settings336.11.4 Viewing VPN Status376.12 Configuring Content Filtering Settings396.13 Configuring Rogue AP Detection426.13.1 Moving Rogue APs to the Allowed AP List456.13.1.1 Displaying Rogue AP Details476.13.2 Using MUs to Detect Rogue Devices496.14 Configuring User Authentication516.14.1 Configuring the Radius Server516.14.2 Configuring LDAP Authentication546.14.3 Configuring a Proxy Radius Server566.14.4 Managing the Local User Database586.14.4.1 Mapping Users to Groups596.14.5 Defining the User Access Policy60Monitoring Statistics637.1 Viewing WAN Statistics647.2 Viewing LAN Statistics687.2.1 Viewing a LAN’s STP Statistics717.3 Viewing Wireless Statistics737.3.1 Viewing WLAN Statistics757.4 Viewing Radio Statistics Summary797.4.1 Viewing Radio Statistics807.4.1.1 Retry Histogram837.5 Viewing MU Statistics Summary857.5.1 Viewing MU Details867.5.2 Pinging Individual MUs897.5.3 MU Authentication Statistics907.6 Viewing the Mesh Statistics Summary917.7 Viewing Known Access Point Statistics92Command Line Interface Reference978.1 Connecting to the CLI978.1.1 Accessing the CLI through the Serial Port978.1.2 Accessing the CLI via Telnet98Tamaño: 2 MBPáginas: 100Language: EnglishManuales abiertas