Figure 48. Configuring A Valid Ap; Table 16. Valid Ap Configuration - D-Link DWS-3024 User Manual

Unified wired & wireless access system
Hide thumbs Also See for DWS-3024:
Table of Contents

Advertisement

an AP profile to the device. When the switch collects and reports information from the RF
scan, it can assign the appropriate status to an AP if it is in the database.

Figure 48. Configuring a Valid AP

Table 16
describes the fields available on the Valid Access Point Configuration page.

Table 16. Valid AP Configuration

Field
Description
MAC Address
This field shows the MAC address of the AP. To change this field, you must
delete the entire Valid AP configuration and then enter the correct MAC
address from the page that lists all Valid APs.
Managed Mode
You can configure the D-Link Access Point to be in one of three modes:
Location
To help you identify the AP, you can enter a location. This field accepts up to
32 alphanumeric characters.
Authentication
You can require the AP to authenticate itself with the switch upon discovery.
Password
If you require authentication, which is a setting on the Basic Setup > Global
tab, you enter the password in this field. The password in this field must
match the password configured on the AP.
Profile
If you configure multiple AP Profiles, you can select the profile to assign to
this AP. For more information about configuring AP Profiles, see
Configuring, and Managing AP Profiles"
Standalone—The AP acts as an individual access point in the network.
You do not manage the AP by using the switch. Instead, you log on to
the AP itself and manage it by using the Administrator Web User
Interface (UI) or CLI.
WS Managed—The AP is part of the D-Link Unified Access System,
and you manage it by using the D-Link Unified Switch. If an AP is in
Managed Mode, the Administrator Web UI on the AP are disabled.
Acknowledged Rogue—The AP has been discovered by the switch and
acknowledge as a Rogue. This AP is not a D-Link Access Point. You can
add an Acknowledged Rogue to the Valid AP list to prevent the Rogue
from being identified as a threat.
5 Configuring Access Point Settings
on page 155.
Configuring Valid Access Point Settings
"Creating,
107

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents