Security Configuration; Mac Access - Avaya AP-7 User Manual

Avaya ap-7 access point: user guide
Hide thumbs Also See for AP-7:
Table of Contents

Advertisement

Security Configuration

The AP provides several security features to protect your network from unauthorized access.

MAC Access

Authentication and Encryption Modes
Rogue Scan
Hardware Configuration Reset
Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by
software settings, other VLAN members or resources appear (to clients) to be on the same
physical segment, no matter where they are attached on the logical LAN or WAN segment.
VLANs simplify traffic flow between clients and their frequently-used or restricted resources.
The AP uses Security Profiles to define allowed wireless clients, and authentication and
encryption types and RADIUS Profiles to define RADIUS Servers used by the system or by a
VLAN.
See the following sections for more information:
VLAN Overview
VLANs and Security Profiles
VLAN Configuration
Security Profiles
RADIUS Profiles
MAC Access
The MAC Access subtab allows you to build a list of stations, identified by their MAC addresses,
authorized to access the network through the AP. The list is stored inside each AP within your
network. Note that you must reboot the AP for any changes to the MAC Access Control Table to
take effect. Up to 1000 entries can be made in the table.
The MAC ACL Status parameter (on the SSID/VLAN > Wireless subtab) is per VLAN if VLAN
Management is enabled. All other parameters besides MAC ACL Status are configured per AP,
even if VLAN is enabled.
(configured under Configure > Alarms > Rogue Scan)
(configured under Configure > Management > CHRD)
on page 135
on page 139
on page 139
on page 141
on page 121
Security Configuration
Issue 1 September 2004
129

Advertisement

Table of Contents
loading

Table of Contents