Authentication, Authorization, And Accounting; Roaming; Rf Management - 3Com 3CRWX120695A Installation And Basic Configuration Manual

Wireless lan mobility system wireless lan switch and controller
Hide thumbs Also See for 3CRWX120695A:
Table of Contents

Advertisement

Software Features
17
Authentication,
802.1X—A WX switch can authenticate users based on 802.1X
Authorization, and
protocols. Based on authentication, users are assigned VLAN
Accounting
membership, access control, and roaming boundaries.
MAC authentication—If a device does not support 802.1X, you can
configure authentication based on the source MAC address to assign
VLAN membership, access control, and roaming boundaries.
Guest authentication—Guests can be authenticated by a shared set of
authorization attributes that assign VLAN membership, access control,
and roaming boundaries.
Local and remote authentication—You can authenticate users locally
using information configured on the WX switch, or use a Remote
Authentication Dial-In User Service (RADIUS) server. When you use a
remote server, the WX switch can enhance performance by
performing some of the AAA tasks locally or distributing the load
across multiple servers.

Roaming

MAP access point roaming—You can configure the WX switch to
allow users to roam from one MAP access point to another on the
same WX switch.
Mobility Domain™ roaming—You also can configure a group of WX
switches to allow users to roam from one switch to another.
Regardless of the wired subnet connections, each user maintains the
same IP address and session across the network.
Session management—You can display session information and
statistics for users.

RF Management

RF Auto-Tuning—MSS can automatically assign channels and power
settings to MAP access points based on RF information collected from
the network.
Radio frequency (RF) topology—With 3Com Wireless Switch Manager,
you can verify site coverage and capacity.
Rogue detection and countermeasures—MAPs can be used to gather
RF information for validating an RF deployment plan, and for
detecting and combatting rogue access points.
User-based RF—You can gather statistics on a per-user basis as users
roam across the network.

Advertisement

Table of Contents
loading

This manual is also suitable for:

3crwx440095a

Table of Contents