Netgear Business Central Wireless Manager (BCWM) Manual Do Utilizador

Página de 152
Determine the Location Requirements
For each location, before you set up the location, configure the WiFi networks, and assign the access points,
determine its requirements:
Number of users that must be able to receive WiFi service over managed networks
Type of security and encryption for the managed networks
Number of users that must be able to receive WiFi service over a WiFi network or hotspot
Type of security, encryption, and access for the WiFi network or hotspot
Number of access points required to provide seamless coverage for all WiFi networks and hotspots
through all buildings and floors of the location
Number of licenses required to cover all access points at the location
802.11 frequency bands and channels that are optimal for WiFi usage
For each large location that you plan to set up, we recommend that you perform a site survey:
To determine the current RF behavior and detect both 802.11 and non-802.11 noise, run a spectrum
analysis of the channels of the site.
To determine the maximum throughput that is achievable on clients, run a test to check connectivity
between access points and clients.
Identify potential RF obstructions and interference sources.
Determine areas where denser coverage might be required because of heavier usage.
Determine the Management VLAN
To enable all access points at a location to connect over the Internet to the cloud, make sure that the
management VLAN is set up correctly at the location and that all access points at the location use the correct
management VLAN. The default management VLAN ID is ID 1. However, you can change the management
VLAN for individual access points. For more information, see 
Plan the Client Authentication and Data Encryption
A WiFi user must authenticate to the WiFi network to be able to access WiFi resources. A WiFi network can
support several types of security methods, including those methods that require a RADIUS authentication
server. The encryption option that is available depends on the authentication method that you selected. The
following table lists the authentication and corresponding encryption methods that you configure through
the application.
Introduction to the Business Central Wireless Manager 2.1
13
Business Central Wireless Manager 2.1 Application