Wfs709tp prosafe smart wireless switch hardware installation guide




















To change the name of other SSIDs but retain the configurations: 1. When a client sends a broadcast probe request frame to search for all available SSIDs, this option controls whether or not the system responds for this SSID. The LMS is responsible for terminating user traffic from the APs, processing it, and forwarding it to the wired network. Enables power management. Number of heartbeat misses before an AP reboots. Enables disconnecting of calls that exceed the high capacity threshold.

This helps prevent mid-air collisions for wireless clients that are not within wireless peer range and cannot detect when other wireless clients are transmitting. This is the maximum number of beacon cycles before unacknowledged network broadcasts are flushed. When using wireless clients that employ power management features to sleep, the client must revive at least once during the DTIM period to receive broadcasts.

Once the location is added, the location page is opened up with the inherited SSID. IRM takes the distributed algorithm approach, allowing APs to determine their transmit power and channel settings based on what they detect.

Note: The Multi Band option is currently unavailable. Selecting Multi Band automatically sets the selection to Single Band 3. Page Configuring Aaa Servers You can use an external authentication server or an internal user database to authenticate users who need to access the wireless network. Set the Mode to Enable to activate the authentication server. Note: When you configure a server, you can set the VLAN for users based on attributes returned for the user during authentication.

These values take precedence over the default VLAN configured for the user. Click Add User in the Users section. The user configuration page displays. Enter the information for the user. Configure the timers as described above. Click Apply before moving on to another page or closing the browser window.

Failure to do this results in loss of configuration, and you will have to reconfigure the settings. Page Configuring Page Configure the WLAN, specifying the authentication and encryption that matches the wireless client configuration.

Page Advanced Configuration Options For Advanced Authentication Fields Field Description Authentication Server Time in seconds after which the authentication server is timed Timeout if it fails to respond. Rotation Many wireless clients do not support this function.

Unicast Key Rotation The time period between each unicast key rotation. A Captive Portal presents a web page that requires action on the part of the wireless user before network access is granted.

The required action can be simply viewing and agreeing to an acceptable use policy, or entering a user ID and password that must be validated against a database of authorized users.

This can be set to any URL. Logon Wait Interval Time range, in seconds, the user will have to wait for the logon page to pop up if the CPU load is high. For Protocol Type, select http and click Apply. Optional Customize the captive portal background text. Set the background color in the Custom page background color field.

The color code must a hexadecimal value in the format hhhhhh. Click Submit on the bottom on the page. Configuring the Captive Portal v1. While not the most secure and scalable method, MAC-based authentication implicitly provides an additional layer of security to authentication devices. Check the Authentication Enabled checkbox to enable authentication. Configure the authentication servers. To add an authentication server, click Add under Choose an Authentication Server. Enter the user information.

In the User Name field, enter the MAC address of the device to be used, this is the MAC- address of the physical interface that will be used to access the network.

By default, the entry should be in the format xxxxxx. Page Chapter Typically, this is the first expansion of a network with just one WFSTP which is a by definition a master switch.

More complicated multi This chapter covers migration to both of those scenarios. Apply the configuration on the master. An AP is considered to be a rogue AP if it is both unauthorized and plugged into the wired side of the network.

You can enable or disable AP learning from the browser interface. Under Management Users, click Add. Enter the name and password for the user. SNMPv3 User Details continued Field Description Privacy protocol An indication of whether messages sent on behalf of this user can be protected from disclosure, and if so, the type of privacy protocol being used. This page includes fields for configuring the SNMP parameters on all access points in the network.

SNMPv3 Access Point User Details continued Field Description Privacy protocol An indication of whether messages sent on behalf of this user can be protected from disclosure, and if so, the type of privacy protocol that is used.

To add a logging server, click Add in the Logging Server section. Figure 5. Click Done to make the modification. Click Apply to apply the configuration. Creating Guest Accounts You can create a special administrative login that allows a user, such as a front desk receptionist, to create guest accounts on a browser interface page. Page Figure 6. The user can then define a user name and password for the guest account and configure the expiration for the account.

Clicking Apply adds the guest account to the database Figure Page Managing Image Files 4. Select the system partition to which the image file is copied. Specify the boot partition, whether the switch is to be rebooted after the image file is transferred, and whether the current configuration is saved before the switch is rebooted.

Page Copying Log Files 2. Click Restore to restore the flashbackup. There is a default server certificate installed in the WFSTP, however this certificate does not guarantee security for production networks. Increasing the LI can further increase battery life, but can also decrease client responsiveness. This feature is disabled by default. When the disconnect extra call feature is enabled, the system monitors the number of active voice calls, and if the defined threshold is reached, any new calls are disconnected.

Check with the manufacturer of your handset to see if this feature is supported. Click OK to save this information. Windows connects to the preferred networks in the order in which they appear. Figure B-1 4. Click the Advanced button to display the Networks to access window Figure B-2 This window determines what types of wireless networks the client can access.

Make sure that the option Computer-to-computer ad hoc networks only is not selected, then click Close. In the Wireless Networks tab, click Add to add a wireless network. Figure B-3 8. Click the Authentication tab to enter the This tab configures the EAP type used between the wireless client and the authentication server.

This instructs the client to check the validity of the server certificate from an expiration, identity, and trust perspective. Figure B-5 Use with caution on a production switch, as this takes effect immediately.

Once you have a page you find acceptable, click on View Captive Portal one more time to display your login page. Your system will display the HTML source for the captive portal page. Save this source as a file on your local system.

Fix the references: If you have used the built-in preferences, you will need to update the reference for the logo image and the CSS style sheet. Translate the web page text. Once you have made the changes as above, you only need to translate the rest of the text that appears on the page. The exact text that appears will depend on the WFSTP settings when you originally viewed the captive portal. The default welcome page will depend slightly on your configuration, but will look similar to Figure C Customizing the Pop-Up Box Before you can customize the pop-up box, you must customize your welcome page.

Page Numbers Print page 1 Print document pages. Rename the bookmark. Delete bookmark? Cancel Delete. Delete from my manuals? Sign In OR. Don't have an account?

Sign up! Restore password. Upload manual. A-1 Cables A-1 GE Uplink Port A-2 Serial Console Port A-3 Port and Adapter Pinouts A-3 Console Terminal Settings The information in this manual is intended for trained technicians responsible for installing this product.

Failure to take heed of this notice may result in personal injury or death. This manual is written for the WFSTP according to these specifications: Product Version Manual Publication Date For more information about network, wireless, and firewall technologies, see the links to the Your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files.

Page Chapter 1. You can install upgrades using HTTP. Green An Ethernet link has been established on the port, but no data is currently being transmitted or received.

If more than one AP is connected to the port, the state with the highest precedence is displayed. See on page A-3 for more port and cable specifications.

Note: There should be another person available to help position the chassis. Remove all rings, jewelry, and other potentially conductive material before working with this product.

Note: Some racks require different screws which are not included. Make sure that you use the correct screws or fasteners for your rack system. Make sure you understand the procedure and all precautions. Before beginning, read the entire procedure. Make sure you understand all the precautions in these steps, as well as those listed on 2. Make sure that the power supply can handle the connected Power over Ethernet PoE devices. Note: The total power drawn by all connected PoE devices must not exceed Watts.

Check the fans to verify they are working. You should be able to hear the fans operating and feel significant airflow blowing from the chassis vents at each of the three fan positions. This port is for connecting a local management console and can be used to access the text-based command-line interface CLI to configure, manage, and troubleshoot the switch.

Table A



0コメント

  • 1000 / 1000