Rogue Ap Enhancements; Radius Time-Based Authentication; Qbss Support - Motorola AP-7131N-FGR Product Reference Manual

Hide thumbs Also See for AP-7131N-FGR:
Table of Contents

Advertisement

1-22
AP-7131N-FGR Access Point Product Reference Guide
• local 802.11 traffic termination
• local encryption/decryption
• local traffic bridging
• the tunneling of centralized traffic to the wireless switch
For a information overview of the adaptive AP feature as well as how to configure it, refer to
Adaptive AP on page

1.2.35 Rogue AP Enhancements

The access point can scan for rogues over all channels on both of the access point's radio bands. The
switching of radio bands is based on a timer with no user intervention required.
For information on configuring the access point for Rogue AP support, see
Detection on page

1.2.36 Radius Time-Based Authentication

An external server maintains a users and groups database used by the access point for access
permissions. Various kinds of access policies can be applied to each group. Individual groups can be
configured with their own time-based access policy. Each group's policy has a user defined interval
defining the days and hours access is permitted. Authentication requests for users belonging to the
group are honored only during these defined hourly intervals.
For more information on defining access point access policies by group, see
Permissions by Group on page

1.2.37 QBSS Support

Each access point radio can be configured to optionally allow the access point to communicate
channel usage data to associated devices and define the beacon interval used for channel utilization
transmissions. The QBSS load represents the percentage of time the channel is in use by the access
point and the access point's station count. This information is very helpful in assessing the access
point's overall load on a channel, its availability for additional device associations and multi media
traffic support.
For information on enabling QBSS and defining the channel utilization transmission interval, see
Configuring the 802.11a/n or 802.11b/g/n Radio on page
10-1.
6-44.
6-67.
Configuring Rogue AP
Defining User Access
5-59.

Advertisement

Table of Contents
loading

Table of Contents