ADTRAN BlueSecure Controller Setup And Administration Manual page 7

Software release version: 6.5
Table of Contents

Advertisement

How a BSAP Discovers BSCs ........................................................... 12-5
How a BSAP Selects a Home BSC .................................................... 12-6
Uploading BSAP Firmware Files ....................................................... 12-6
Configuring Global Radio Settings ................................................. 12-10
Editing Settings for an Individual BSAP............................................ 12-19
Creating SSIDs............................................................................. 12-20
Creating BSAPs............................................................................ 12-24
Enabling BSAP Service.................................................................. 12-26
Displaying Configured BSAPs ........................................................ 12-29
Chapter 13
Configuring RF Alarms .................................................................... 13-3
Configuring Manual Containment .................................................... 13-6
Configuring Autocontainment........................................................... 13-6
Chapter 14
An Overview of the Secure Mobility MatriX ....................................... 14-2
Secure Mobility® ........................................................................... 14-3
Replication .................................................................................. 14-10
Load Sharing ............................................................................... 14-17
BlueSecure™ Controller Setup and Administration Guide
RF Intrusion Detection/RF Containment .......................................... 12-3
802.11b/g/n Radio Configuration............................................. 12-10
802.11a/n Radio Configuration ................................................ 12-18
BSAP Authentication Options ..................................................... 12-20
BSAP Data Encryption Options ................................................... 12-21
SSID Configuration Procedure .................................................... 12-22
Reasons for Deploying a Secure Mobility MatriX ............................ 14-2
General Configuration Procedure ................................................. 14-3
How Secure Mobility Works ........................................................ 14-4
Network Requirements................................................................. 14-5
Step 2: Create a List of Nodes ..................................................... 14-7
Step 3: Set Up Secure Mobility® on the Nodes .............................. 14-8
Tracking Secure Mobility Status .................................................... 14-9
Enabling VLAN Roaming Across LSG BSCs .................................. 14-10
Step 1: Set Up Replication on the Master..................................... 14-12
Step 3: Set Up Replication on the Nodes ..................................... 14-13
Configuring a Replication Override............................................. 14-15
Tracking Replication Status ........................................................ 14-16
Typical Configuration ................................................................ 14-17
Network Requirements............................................................... 14-18
Configuring BSC Load Sharing (No NAT) .................................... 14-22
Contents
vii

Advertisement

Table of Contents
loading

Table of Contents