5.6.1 Certificate Management ........................................................................................................................................... 5-164
5.6.2 RSA Key Management .............................................................................................................................................. 5-172
5.6.3 Certificate Creation ................................................................................................................................................... 5-176
5.7 RF Domain Overrides ........................................................................................................................................................... 5-181
5.8 Profile Overrides .................................................................................................................................................................. 5-184
5.9 Radio Power Overrides ........................................................................................................................................................ 5-187
5.10 Adoption Overrides ............................................................................................................................................................ 5-189
5.10.1.4 WAN Backhaul Overrides ............................................................................................................................ 5-214
5.11 Managing an Event Policy ................................................................................................................................................. 5-286
6.1 Wireless LANs ......................................................................................................................................................................... 6-3
6.1.1 Basic WLAN Configuration ........................................................................................................................................... 6-4
6.1.2 Configuring WLAN Security .......................................................................................................................................... 6-7
6.1.2.2 MAC Authentication ......................................................................................................................................... 6-11
6.1.2.3 PSK / None ....................................................................................................................................................... 6-12
6.1.2.4 Captive Portal ................................................................................................................................................... 6-13
6.1.2.5 WPA/WPA2-TKIP .............................................................................................................................................. 6-14
6.1.2.6 WPA2-CCMP ..................................................................................................................................................... 6-18
6.1.2.7 WEP 64 ............................................................................................................................................................. 6-22
6.1.2.8 WEP 128 and KeyGuard.................................................................................................................................... 6-25
Table of Contents
iii