AMX NXA-WAP1000 Reference Manual page 37

Smart wireless access point
Hide thumbs Also See for NXA-WAP1000:
Table of Contents

Advertisement

FIG. 17
Configuration -Radio 2.4G - Wireless 1 page
Configuration - Radio 2.4G - Wireless Page
Wireless Network:
Wireless Availability?:
Broadcast SSID:
SSID:
Dynamic VLAN?:
Threshold Settings:
Rate Limiting:
Access Control:
Encryption Method:
Update Settings:
NXA-WAP1000 Smart Wireless Access Point
Enter a name for the WLAN. This name is only displayed in the Browser-Based
Configuration Pages. You can use the same name as the SSID or a different
name.
This option controls whether or not the wireless network is available to users
(Off or On).
This option controls whether or not the WLAN SSID is visible to anyone looking
for wireless networks. Disabling (hiding) the SSID requires that the user be told
the correct SSID before they can connect to your network.
This is the publicly-broadcast "name" of your wireless network.
A default SSID is present (which you ideally replaced in the installation
process). If the default SSID is still active, it is strongly recommended that you
change it. The SSID identifies the WLAN in the user's wireless connection
software. The SSID can be up to 32 characters in length, contain letters and
numbers, and is case-sensitive.
Dynamic VLAN can be used to assign VLAN IDs to wireless clients based on
RADIUS attributes, when a RADIUS authentication server is used. Enable this
feature to allow RADIUS to designate VLAN IDs for each wireless client.
This button opens a page where you can configure the Protection Mode you
activated. If Protection Mode is not active, ignore this option.
This button opens a page where you can configure upload and download limits
per station.
This button opens a page where you can configure access controls for the
WLAN.
By default, all data exchanges on your wireless network are not encrypted, but
you can pick an encryption method in this option, and use the extra workspace
features that appear to fine-tune the encryption settings.
Using WPA encryption is highly recommended, as WEP has been proven to be
easily circumvented.
Click this button to save and apply your changes
Browser-Based Configuration Pages
31

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents