Motorola WiNG 5 System Reference Manual page 5

Table of Contents

Advertisement

5.6.1 Certificate Management ........................................................................................................................................... 5-164
5.6.2 RSA Key Management .............................................................................................................................................. 5-172
5.6.3 Certificate Creation ................................................................................................................................................... 5-176
5.6.4 Generating a Certificate Signing Request ................................................................................................................ 5-178
5.7 RF Domain Overrides ........................................................................................................................................................... 5-181
5.8 Profile Overrides .................................................................................................................................................................. 5-184
5.9 Radio Power Overrides ........................................................................................................................................................ 5-187
5.10 Adoption Overrides ............................................................................................................................................................ 5-189
5.10.1 Profile Interface Override Configuration ................................................................................................................. 5-191
5.10.1.1 Ethernet Port Override Configuration ........................................................................................................... 5-192
5.10.1.2 Virtual Interface Override Configuration ...................................................................................................... 5-199
5.10.1.3 Radio Override Configuration ....................................................................................................................... 5-204
5.10.1.4 WAN Backhaul Overrides ............................................................................................................................ 5-214
5.10.2 Overriding the Network Configuration .................................................................................................................... 5-216
5.10.2.1 Overriding the DNS Configuration ................................................................................................................ 5-217
5.10.2.2 Overriding an ARP Configuration .................................................................................................................. 5-219
5.10.2.3 Overriding a L2TPv3 Profile Configuration ................................................................................................... 5-221
5.10.2.4 Overriding an IGMP Snooping Configuration ............................................................................................... 5-230
5.10.2.5 Overriding a Quality of Service (QoS) Configuration .................................................................................... 5-232
5.10.2.6 Overriding a Spanning Tree Configuration ................................................................................................... 5-234
5.10.2.7 Overriding a Routing Configuration .............................................................................................................. 5-237
5.10.2.8 Overriding a Dynamic Routing (OSPF) Configuration ................................................................................... 5-240
5.10.2.9 Overriding a Forwarding Database Configuration ........................................................................................ 5-250
5.10.2.10 Overriding a Bridge VLAN Configuration .................................................................................................... 5-252
5.10.2.11 Overriding a Cisco Discovery Protocol Configuration ................................................................................. 5-256
5.10.2.12 Overriding a Link Layer Discovery Protocol Configuration ......................................................................... 5-257
5.10.2.13 Overriding a Miscellaneous Network Configuration .................................................................................. 5-259
5.10.3 Overriding a Security Configuration ........................................................................................................................ 5-260
5.10.3.1 Overriding General Security Settings ........................................................................................................... 5-261
5.10.3.2 Overriding a Certificate Revocation List (CRL) Configuration ...................................................................... 5-262
5.10.3.3 Overriding a Profile's NAT Configuration ..................................................................................................... 5-264
5.10.4 Overriding a Services Configuration ....................................................................................................................... 5-273
5.10.5 Overriding a Management Configuration ............................................................................................................... 5-274
5.10.6 Overriding an Advanced Configuration ................................................................................................................... 5-279
5.11 Managing an Event Policy ................................................................................................................................................. 5-286
6.1 Wireless LANs ......................................................................................................................................................................... 6-3
6.1.1 Basic WLAN Configuration ........................................................................................................................................... 6-4
6.1.1.1 WLAN Basic Configuration Deployment Considerations ................................................................................... 6-7
6.1.2 Configuring WLAN Security .......................................................................................................................................... 6-7
6.1.2.1 802.1x EAP, EAP PSK and EAP MAC .................................................................................................................. 6-9
6.1.2.2 MAC Authentication ......................................................................................................................................... 6-11
6.1.2.3 PSK / None ....................................................................................................................................................... 6-12
6.1.2.4 Captive Portal ................................................................................................................................................... 6-13
6.1.2.5 WPA/WPA2-TKIP .............................................................................................................................................. 6-14
6.1.2.6 WPA2-CCMP ..................................................................................................................................................... 6-18
6.1.2.7 WEP 64 ............................................................................................................................................................. 6-22
6.1.2.8 WEP 128 and KeyGuard.................................................................................................................................... 6-25
6.1.3 Configuring WLAN Firewall Support .......................................................................................................................... 6-27
Table of Contents
iii

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents