viii
WiNG 4.4 Switch System Reference Guide
5.5 Layer 3 Mobility ..........................................................................................................................................................................................5-48
5.5.1 Configuring Layer 3 Mobility ...........................................................................................................................................................5-49
5.5.2 Defining the Layer 3 Peer List .........................................................................................................................................................5-51
5.5.4 Reviewing Layer 3 MU Status .........................................................................................................................................................5-53
5.6 Configuring Self Healing ............................................................................................................................................................................5-54
5.7 Configuring Switch Discovery ....................................................................................................................................................................5-58
5.7.1 Configuring Discovery Profiles ........................................................................................................................................................5-58
5.7.2 Viewing Discovered Switches .........................................................................................................................................................5-60
5.8.1 RTLS Overview .................................................................................................................................................................................5-63
5.8.3 Defining Site Parameters ................................................................................................................................................................5-64
5.8.4 Configuring SOLE Parameters .........................................................................................................................................................5-66
5.8.6 Configuring Ekahau Parameters ......................................................................................................................................................5-70
6.2 Access Point Detection .................................................................................................................................................................................6-4
6.2.2 Authorized / Ignored APs ...................................................................................................................................................................6-7
6.2.3 Unauthorized APs (AP Reported) ......................................................................................................................................................6-7
6.2.4 Unauthorized APs (MU Reported) ......................................................................................................................................................6-9
6.2.5 AP Containment .................................................................................................................................................................................6-9
6.3.2 Viewing Filtered MUs ......................................................................................................................................................................6-13
6.4.1 ACL Overview ..................................................................................................................................................................................6-15
6.4.5 Attaching Adaptive AP WLANs .......................................................................................................................................................6-24
6.4.6 Attaching Adaptive AP LANs ...........................................................................................................................................................6-27
6.4.7 Configuring Wireless Filters ............................................................................................................................................................6-28
6.4.9 Adding a new Wireless Filter ..........................................................................................................................................................6-31
6.4.10 Associating an ACL with WLAN ....................................................................................................................................................6-32
6.4.11 Configuring the Firewall ................................................................................................................................................................6-33
6.4.12 Configuring Layer 2 Firewall ..........................................................................................................................................................6-37
6.4.15 Configuring the Role ......................................................................................................................................................................6-44
6.5 Configuring NAT Information .....................................................................................................................................................................6-56
6.5.2 Defining Static NAT Translations ....................................................................................................................................................6-59
6.5.3 Configuring NAT Interfaces .............................................................................................................................................................6-62
6.5.4 Viewing NAT Status ........................................................................................................................................................................6-63
6.6 Configuring IKE Settings .............................................................................................................................................................................6-64
6.6.1 Defining the IKE Configuration ........................................................................................................................................................6-64
6.6.2 Setting IKE Policies ..........................................................................................................................................................................6-66