Manuel D’UtilisationTable des matièresTable of Contents5Chapter 1 Introduction111.1 Fortress Secure Wireless Access Bridge111.1.1 Management Interfaces111.1.1.1 Bridge GUI111.1.1.2 Bridge CLI121.1.1.3 SNMP121.2 Network Security Overview121.3 The Fortress Security System121.3.1 Multi-factor Authentication™121.3.2 Strong Encryption at the MAC Layer131.3.3 System Components131.3.4 Operating Modes131.3.4.1 Normal Operating Mode131.3.4.2 FIPS Operating Mode131.3.5 Deployment Options141.4 This Document151.4.1 Document Conventions151.4.2 Related Documents15Chapter 2 Installation162.1 Introduction162.1.1 System Requirements162.1.2 Compatibility172.2 Preparation172.2.1 Shipped and Optional Parts172.2.2 Preparing the Network182.2.3 Port Locations182.2.4 Safety Requirements182.3 Installation Instructions212.4 Outdoor Installation212.4.1 Connecting the Bridge for Preconfiguration222.4.2 Preconfiguring the Bridge for Outdoor Operation222.4.3 Weatherizing the Bridge262.4.4 Mast Mounting the Bridge282.4.5 Reconnecting the Bridge for Outdoor Operation282.5 Indoor Installation292.5.1 Connecting the Bridge for Indoor Operation292.5.2 Configuring the Bridge for Indoor Operation30Chapter 3 Configuration313.1 The Bridge GUI313.1.1 User Accounts313.1.2 Accessing the GUI313.1.3 Logging Off323.2 LAN Settings323.2.1 Spanning Tree Protocol333.2.2 WAN Port Encryption333.3 Radio Settings343.3.1 Radio State, Band and Mode Settings353.3.1.1 Radio State353.3.1.2 Radio Band353.3.1.3 Radio Mode353.3.1.4 Bridge Mode353.3.2 Radio Transmission and Reception Settings363.3.2.1 Channel363.3.2.2 Transmit Power363.3.2.3 Distance373.3.2.4 Preamble373.3.2.5 Beacon Interval383.3.2.6 Multicasting383.3.2.7 Received Signal Strength Indicator393.3.3 Configuring Basic Radio Settings393.3.4 Virtual Radio Interface Settings393.3.4.1 SSID403.3.4.2 Hide SSID and Accept G Only Options413.3.4.3 DTIM Period413.3.4.4 RTS and Fragmentation Thresholds413.3.4.5 Security Suite and Security Suite Settings413.3.4.6 Configuring Virtual Radio Settings443.4 802.1X Server and LAN Port Settings453.4.1 802.1X Authentication Server453.4.2 LAN Port 802.1X Settings463.5 Bridge Passwords463.6 Security Settings473.6.1 Operating Mode483.6.2 Secure Shell Access493.6.3 Encryption Algorithm493.6.4 Re-keying Interval503.6.5 Access ID503.6.6 Non-802.1X Authentication Global and Default Settings513.6.6.1 Enabling/Disabling Authentication Globally523.6.6.2 Local Authentication Server523.6.6.3 External Authentication Server533.6.6.4 Enabling/Disabling Device Authentication543.6.6.5 Maximum Authentication Retries543.6.6.6 Restart Session Login Prompt553.6.6.7 Default User Authentication Settings563.6.6.8 Default Device Authentication Settings563.7 Blackout Mode573.8 System Date and Time583.9 Restoring Default Settings583.10 Front-Panel Operation593.10.1 Mode Selection from the Front Panel593.10.1.1 Toggling the Bridge Mode Setting on Radio 2593.10.1.2 Toggling the Blackout Mode setting603.10.2 Rebooting the Bridge from the Front Panel613.10.3 Restoring Defaults from the Front Panel61Chapter 4 Administration624.1 Device Authentication624.1.1 Maximum Device Authentication Retries624.1.1 Default Device Authentication Settings634.1.2 Individual Device Authentication Settings634.1.2.1 Editing a Device644.1.2.2 Deleting Devices654.2 User Authentication654.2.1 Maximum User Authentication Retries664.2.1 Default User Authentication Settings664.2.2 Individual User Authentication Settings664.2.2.1 Adding a User674.2.2.2 Editing a User Account674.2.2.3 Deleting a User Account684.3 Trusted Devices694.3.1 Adding Trusted Devices694.3.1 Editing Trusted Devices704.3.2 Deleting Trusted Devices714.3.3 Visitor Access through Trusted Devices714.4 SNMP Settings714.4.1 Configuring SNMP724.5 Backing Up and Restoring724.5.1 Backing Up the Bridge Configuration744.5.2 Restoring from a Backup File744.6 Software Versions and Upgrades754.6.1 Viewing Current Software Version754.6.2 Upgrading Bridge Software754.7 Rebooting the Bridge77Chapter 5 Monitoring and Diagnostics785.1 Statistics785.1.1 Traffic Statistics795.1.2 Interface Statistics795.1.3 Radio Statistics805.2 Tracking805.3 AP Associations825.4 View Log835.5 Diagnostics855.5.1 Pinging a Device855.5.2 Tracing a Packet Route855.5.3 Flushing the Host MAC Database865.5.4 Generating a Diagnostics File865.6 Front-Panel Indicators875.6.1 System LEDs875.6.2 Radio LEDs885.6.3 Port LEDs89Chapter 6 Command-Line Interface906.1 Introduction906.1.1 CLI Administrative Modes916.1.2 Accessing the CLI through the Serial Port916.1.3 Accessing the CLI Remotely916.1.4 Logging On and Off the CLI916.2 Getting Help in the CLI926.3 Command Syntax936.4 Configuration in the Bridge CLI946.4.1 LAN Settings in the CLI946.4.2 Spanning Tree Protocol in the CLI956.4.3 Bridge Radio Settings in the CLI956.4.3.1 Virtual Radio Interface Settings in the CLI986.4.4 Bridge Passwords in the CLI1006.4.4.1 Changing Bridge GUI Passwords in the CLI1016.4.4.2 Changing the Bridge CLI Password1016.4.5 Security Settings in the CLI1016.4.5.1 Encryption Algorithm in the CLI1016.4.5.2 Re-Keying Interval in the CLI1026.4.5.3 Data Compression in the CLI1026.4.5.4 Access ID in the CLI1036.4.5.5 Operating Mode in the CLI1036.4.5.6 WAN Port Encryption in the CLI1036.4.5.7 SSH Access to the CLI1046.4.5.8 Disabling the Bridge GUI in the CLI1046.4.5.9 Blackout Mode in the CLI1046.4.6 System Date and Time in the CLI1056.4.7 Restoring Default Settings in the CLI1056.4.8 Non-802.1X Authentication Settings in the CLI1056.4.8.1 Non-802.1X Authentication Server Settings1056.4.8.2 Non-802.1X EAP Retry Interval Setting1066.4.9 802.1X Authentication Settings in the CLI1076.4.9.1 802.1X Authentication Server Settings1076.4.9.2 Internal LAN Switch Port 802.1X Settings1096.5 Administration in the Bridge CLI1096.5.1 Trusted Devices in the CLI1096.5.1.1 Adding Trusted Devices in the CLI1106.5.1.2 Deleting Trusted Devices in the CLI1106.5.2 SNMP Settings in the CLI1106.5.3 Viewing the Software Version in the CLI1116.5.4 Restarting the Bridge in the CLI1116.6 Monitoring and Diagnostics in the CLI1116.6.1 Viewing a Summary Overview of the Bridge1116.6.2 Viewing System Uptime in the CLI1126.6.3 Partners Tracking in the CLI1126.6.4 Host Tracking in the CLI1126.6.5 AP Associations in the CLI1136.6.6 Viewing the System Log in the CLI1136.6.7 Pinging a Device1146.6.8 Tracing a Packet Route1146.7 WLAN Wireless Extension Tools1146.7.1 Creating a Wireless Extension Tools Script1156.8 Secure Automatic Configuration1156.8.1 Preconfiguring a New Network Deployment with SAC1166.8.1.1 Connecting the Bridges for Preconfiguration1166.8.1.2 Automatically Preconfiguring Network Bridges1166.8.2 Reconfiguring Network Settings with SAC1196.8.3 Adding and Deleting Network Bridges with SAC1216.8.3.1 Adding a New SAC Network Bridge1216.8.3.2 Deleting a Bridge from a SAC Network123Chapter 7 Specifications1247.1 Hardware Specifications1247.1.1 Performance1247.1.2 Physical1247.1.3 Environmental1247.1.4 Compliance1257.1.5 Logical Interfaces1257.2 RJ-45-to-DB9 Console Port Adapter125Chapter 8 Troubleshooting127Index129Glossary138Taille: 5,1 MoPages: 144Language: EnglishOuvrir le manuel