Colubris Networks Configuration Guide
|
|
- Abraham Hill
- 7 years ago
- Views:
Transcription
1 Colubris Networks Configuration Guide
2 Release 4.1 (February 2006) Copyright 2006 Colubris Networks, Inc. All rights reserved, including those to reproduce this document or parts thereof in any form without written permission from Colubris Networks, Inc. Colubris is a registered trademark, and the Colubris Networks logo, the tag line The Intelligent Wireless Networking Choice, InReach, InMotion, InCharge, and TriPlane are trademarks of Colubris Networks, Inc., in the United States and other countries. All other product and brand names are the service marks, trademarks, registered trademarks, or registered service marks of their respective owners. Changes are periodically made to the information herein; these changes will be incorporated into new editions of the document. You can download the most up-to-date product information from the Colubris Networks website. Go to and on the homepage at left select Support > Product Registration. Colubris Networks, Inc. 200 West Street Ste 300 Waltham, Massachusetts UNITED STATES Phone: Fax: Sales Information sales@colubris.com Customer Support support@colubris.com Training training@colubris.com
3 Contents Contents Chapter 1 Introduction 5 About this guide...6 Software compatibility matrix...8 Typographical conventions...9 Warnings, cautions, and notes...10 Related documents...11 Chapter 2 Management 13 In this chapter...14 Management Tool overview...15 Management station...15 Administrator account...15 Security...15 Validating administrator logins using a RADIUS server...16 Remote management...17 How it works...17 Configuration road map...18 Chapter 3 Public access deployment 21 In this chapter...22 Scenario 1a: Hotspot with Internet access (local mode)...23 How it works...23 Configuration road map...24 Scenario 1b: Hotspot with custom interface (local mode)...26 How it works...26 Configuration road map...27 Scenario 1c: Hotspot with satellites and roaming (local mode)...29 How it works...29 Configuration road map...30 Scenario 1d: Hotspot with layer 2 security (local mode)...32 How it works...32 Configuration road map...33 Scenario 2a: Hotspot with Internet access (AAA server)...35 How it works...35 Configuration road map...36 Scenario 2b: Hotspot with custom interface (AAA server)...39 How it works...39 Configuration road map...40 Scenario 2c: Hotspot with satellites and roaming (AAA server)...42 How it works...42 Configuration road map...43 Scenario 2d: Hotspot with layer 2 security (AAA server)...45 How it works...45 Configuration road map...46 Scenario 2e: Using dual radios to support A+B+G traffic...49 How it works...49 Configuration road map...49 Scenario 3: Shared hotspot for public and private traffic...50 How it works...50 Configuration road map...51 Scenario 4: Delivering custom HTML pages using VLANs (AAA server)...54 How it works...54 Configuration road map...55 Scenario 5: Custom HTML pages on each MAP (local mode)...59 How it works...59 Configuration road map...60 Chapter 4 Enterprise deployment 63 In this chapter...64 Scenario 1: Adding secure wireless networking...65 How it works...65 Configuration road map...65 Scenario 2a: Integrating wireless networking with authentication...67 How it works...67 Configuration road map...67 Scenario 2b: Using multiple wireless profiles and QoS...69 How it works...69 Configuration road map...70 Scenario 2c: Supporting wireless phones...71 How it works...71 Configure the VSC...72 Scenario 3: Adding wireless networking to a segmented network...73 How it works...73 Configuration road map...74 Scenario 4: Roaming across different subnets (single MSC)...77 How it works...77 Configuration road map...78 Scenario 5: Roaming across different subnets (multiple MSCs)...80 How it works...80 Configuration road map...81 Scenario 6: Access-controlled VSCs and roaming...83 How it works...83 Configuration road map...85 Chapter 5 WDS scenarios 91 In this chapter...92 Wireless bridging considerations...93 Single or dual radios?...93 Using 802.1a for WDS...93 Scenario 1: Using RF extension to expand a wired network...94 How it works...94 Configuration road map...95 Scenario 2: Deploying a point-to-point wireless link...98 How it works...98 Configuration road map single radio...99 Configuration road map dual radios Scenario 3: Setting up multi-hop wireless links How it works Configuration road map Chapter 6 More from Colubris 109 Colubris.com For registered customers For Annual Maintenance Support Program customers Information by telephone and
4 Contents
5 Chapter 1: Introduction Chapter 1 Introduction In this chapter you can find an explanation of the conventions used in this guide and an overview of its contents. For information on using different software revisions in your Colubris subnetwork, see the Software compatibility matrix on page 8.
6 Chapter Introduction Chapter 1 About this guide This guide contains a number of detailed scenarios for using Colubris Networks MultiService Access Points (MAPs) and MultiService Controllers (MSCs) in a wide range of applications. Although detailed configuration steps are provided with each scenario, the guide does not cover the basic procedures for operating and configuring Colubris Networks devices. This information can be found in the Administrator s Guide for each device (For a list see page 11.) You should be familiar with this information before attempting to use the scenarios in this guide. The scenarios are grouped according to functionality as follows: Chapter 2: Management Scenario/Topic See page Management Tool overview 15 Validating administrator logins using a RADIUS server 16 Remote management 17 Chapter 3: Public access deployment Scenario/Topic See page Scenario 1a: Hotspot with Internet access (local mode) 23 Scenario 1b: Hotspot with custom interface (local mode) 26 Scenario 1c: Hotspot with satellites and roaming (local mode) 29 Scenario 1d: Hotspot with layer 2 security (local mode) 32 Scenario 2a: Hotspot with Internet access (AAA server) 35 Scenario 2b: Hotspot with custom interface (AAA server) 39 Scenario 2c: Hotspot with satellites and roaming (AAA server) 42 Scenario 2d: Hotspot with layer 2 security (AAA server) 45 Scenario 2e: Using dual radios to support A+B+G traffic 49 Scenario 3: Shared hotspot for public and private traffic 50 Scenario 4: Delivering custom HTML pages using VLANs (AAA server) 54 Scenario 5: Custom HTML pages on each MAP (local mode)
7 Chapter Introduction Chapter 1 Chapter 4: Enterprise deployment Scenario/Topic See page Scenario 1: Adding secure wireless networking 65 Scenario 2a: Integrating wireless networking with authentication 67 Scenario 2b: Using multiple wireless profiles and QoS 69 Scenario 2c: Supporting wireless phones 71 Scenario 3: Adding wireless networking to a segmented network 73 Scenario 4: Roaming across different subnets (single MSC) 77 Scenario 5: Roaming across different subnets (multiple MSCs) 80 Scenario 6: Access-controlled VSCs and roaming 83 Chapter 5: WDS scenarios Scenario/Topic See page Wireless bridging considerations 93 Scenario 1: Using RF extension to expand a wired network 94 Scenario 2: Deploying a point-to-point wireless link 98 Scenario 3: Setting up multi-hop wireless links
8 Chapter Introduction Chapter 1 Software compatibility matrix As part of the Colubris Intelligent MultiService System (CIMS), InCharge MultiService Controllers (MSCs) and MGW-3500 MultiService Gateways must be configured with compatible InReach MultiService Access Points and Colubris Networks wireless client bridges. Following is a software release compatibility matrix that shows you which software versions can be mixed in your CIMS. In general, MSCs and MGWs support access point products that are at the same software release or one software release behind. Note: If you upgrade your Colubris Networks access controller products to the release, all managed access points must be at either or 3.1.x. Stand-alone access points can run any firmware version. However, Colubris strongly recommends that you deploy the same firmware release for all access points in your network. Supported software version on Colubris access controllers MSC-3200 d MSC-3300 e MGW-3500 MSC-5200 Supported software version on Colubris access points and client bridges WAP-200 MAP-320 a MAP-330 b MAP-330 Sensor c WCB-200 c 2.4.x Not supported 2.4.x 2.4.x N/A N/A 3.1.x 3.1.x 3.1.x, 2.4.x 3.1.x, 2.4.x N/A N/A 4.1.x 4.1.x, 3.1.x 4.1.x, 3.1.x 4.1.x, 3.1.x N/A N/A MSC-5500 MSC-5200/MSC-5500 plus COS Services Pack f 3.1.x 3.1.x 3.1.x, 2.4.x 3.1.x, 2.4.x N/A N/A 4.1.x 4.1.x, 3.1.x 4.1.x, 3.1.x 4.1.x, 3.1.x N/A N/A 4.1.x N/A 4.1 only 4.1 only N/A N/A a. Includes product variants MAP-320R and MAP-320S. b. Includes ruggedized product variant MAP-330R. c. MAP-330 Sensors and WCB-200 wireless client bridges do not interact with an MSC or MGW and can be used in these networks at any supported software version. d. Includes ruggedized product variant MSC-3200R. e. Includes ruggedized product variant MSC-3300R. f. In order to use the mobility services features in including both Layer 2 fast and secure authentication and Layer 3 mobility you must upgrade associated MAPs to the release
9 Chapter Introduction Chapter 1 Typographical conventions The following table gives the typographical conventions used in Colubris Networks technical documentation. Example Network > Ports ip_address use-access-list=usename ssl-certificate=url [ %s ] Description When referring to the Management Tool web interface, items in bold identify menu commands or input fields. Submenus are indicated by the > sign. The example refers to the Ports submenu, which is found under the Network menu. Items in italics identify parameters for which you must supply a value. Monospaced text identifies command-line output, program listings, or commands that you enter into configuration files or profiles. Square brackets identify optional arguments. That is, you can decide whether to enter the argument. Do not enter the brackets. [ ONE TWO ] A vertical line indicates mutually-exclusive choices. That is, you can specify only one item. { ONE TWO } Curly brackets group required arguments. Note: The Management Tool web interface is an element management system that is distinct from the Colubris Networks InCharge network management system, CNMS
10 Chapter Introduction Chapter 1 Warnings, cautions, and notes The following table explains some of the special symbols used in Colubris Networks technical documentation. Lead Warning! Caution! Note: Description Warnings provide information that you must follow to avoid risk of physical injury. Cautions provide information that you must follow to avoid damage to the hardware or software components of the system. Notes provide important information about a procedure or topic
11 Chapter Introduction Chapter 1 Related documents The following documents provide additional information. You can find instructions on how to download additional documentation on the copyright page. Document Provides you with... Quickstart Guides Administrator Guides Public Access Administrator Guide Engineering Release Notes Hardware and startup information for the Colubris Networks devices mentioned in this guide. Hardware and configuration information for the Colubris Networks devices mentioned in this guide. Detailed discussions on configuring the public access interface provided by MSC devices. Specific information about the latest release of Colubris Networks firmware, including the newest features, fixes, and known issues
12 Chapter Introduction Chapter
13 Chapter 2: Management Chapter 2 Management In this chapter you can find scenarios that illustrate strategies for managing one or more devices across various network topologies.
14 Chapter Management Chapter 2 In this chapter This chapter contains the following topics. Scenario/Topic See page Management Tool overview 15 Validating administrator logins using a RADIUS server 16 Remote management
15 Chapter Management Chapter 2 Management Tool overview The Management Tool is a Web-based interface to the MAP/MSC that provides easy access to all configuration functions. Note: The Management Tool web interface is an element management system that is distinct from the Colubris Networks InCharge network management system. Management station Management station refers to the computer that an administrator uses to connect to the Management Tool. To act as a management station, a computer must Have a JavaScript-enabled Web browser installed; that is, Netscape 7.01 or higher, or Internet Explorer 6.0 or higher, including all updates Be able to establish an IP connection with the MAP/MSC, either through the wireless port or LAN ports Administrator account Administrator password Access to the Management Tool is protected by a username and password. The factory default setting for both is admin. Colubris Networks recommends that you change both on the Management tool configuration page, which you can access by selecting Management > Management tool. Caution! If you forget the administrator password, the only way to gain access to the Management Tool is to reset the MAP/MSC to factory default settings. Account policy To maintain the integrity of configuration settings, only one administrator can be connected to the Management Tool at a given time. To prevent the Management Tool from being locked up by an idle administrator, two mechanisms are in place: If a administrator s connection to the Management Tool remains idle for more than ten minutes, the MAP/MSC automatically logs the administrator out. If a second administrator connects to the Management Tool and logs in with the correct username and password, the first administrator s session is terminated. (Default setting) If required, you can disable this mechanism on the Management tool configuration page, which you can access by selecting Management > Management tool. Security The Management Tool is protected by the following security features: HTTPS: Communications between the management station and the MAP/MSC occurs through HTTPS. Before logging on to the Management Tool, administrators must accept a Colubris Networks certificate. You can replace this certificate with your own. Port blocking: Access to the Management Tool can be explicitly enabled or disabled for a variety of interfaces depending on the type of unit. Available options may include: wireless port, LAN port, Internet port, VLAN, GRE, or WDS
16 Chapter Management Chapter 2 Validating administrator logins using a RADIUS server You can use a RADIUS server to authenticate logins to the Management Tool. One advantage of this method is that it enables you to create several administrator accounts, each with its own username and password. Caution! Ensure that the RADIUS profile you select is configured and that the administrator account is defined on a functioning RADIUS server. If not, you will not be able to log back into the MAP because the administrator password cannot be authenticated. Use the following steps to configure RADIUS authentication. 1. Create a RADIUS profile to use for administrator authentication: Select Security > RADIUS. Click Add New Profile. Define settings for the RADIUS server that you want to use to validate administrator logins. Click Save. 2. Specify this RADIUS profile for administrator authentication: Select Management > Management tool. Under Administrator authentication Authenticate via, select the RADIUS profile that you created in the first step. Under Username, enter the login name for the administrator. Default is admin. Under Current password, enter the administrator password. Default is admin. Under New password, enter the new administrator password. New passwords must be at least six characters long and contain at least four different characters. Under Confirm new password, retype the new administrator password. As a precaution, you can enable the Try local account if RADIUS is unreachable feature to allow access if the RAIDUS server is down. Click the Test button to verify that authentication is working. Click Save
17 Chapter Management Chapter 2 Remote management This scenario shows you how to set up an MSC to provide remote management of the MAPs connected to it. How it works When a MAP is installed behind an MSC, enabling remote access to its management tool requires configuration settings to be defined on the MSC and the RADIUS server. This section explains how to configure remote management for the following two topologies: Topology A Topology B RADIUS server 20.1 Management station RADIUS server 20.2 VPN server VPN tunnel Management station (address in VPN tunnel) 30.3 (address in VPN tunnel) Router MSC 10.1 M S C MSC M S C 30.2 (address in VPN tunnel) MAP 1.3 MAP 1.2 MAP 1.3 MAP PUBLIC WL AN PUBLIC WL AN PUBLIC WL AN PUBLIC WL AN A B A B
18 Chapter Management Chapter 2 Configuration road map On the management station To reach the management tool on the MAPs, the management station must specify the following addresses in its web browser: Topology A To reach MAP A: To reach MAP B: Topology B To reach MAP A: To reach MAP B: Static NAT mappings are used on the MSC to direct traffic to the proper MAP. MAC address authentication enables the MAPs to log into the public access network. Access list definitions allow traffic to be sent from the MSCs to the management stations. Configure the MSCs Create static NAT mappings To direct management traffic to the proper MAP, you need to create static NAT mappings (on the Network > NAT page) to redirect HTTPS traffic to the new ports you defined on the MAPs. Map traffic on port 5002 to IP address and port 443. Map traffic on port 5003 to IP address and port 443. Configure the RADIUS server Create an MSC profile Create a RADIUS profile for the MSC as follows: MAC address authentication For the MAP to communicate with the management station, it must log into the public access network provided by the MSC. To accomplish this, add a MAC address attribute to the MSC s RADIUS profile for each MAP. This attribute enables the access controller to authenticate devices (such as the MAPs) based on their MAC address. For example: mac-address=address[,username[,password]] Replace address and username with the MAC address of the MAP. Replace password with the same password that the MSC uses to communicate with the RADIUS server
19 Chapter Management Chapter 2 A note about security Access list In both topology A and B it makes sense to protect access to the RADIUS server and management station. This is required because once logged in, public access customers gain access to all resources connected to the MSCs Internet port. An access list definition can be used to block all traffic to , for topology A, and , for topology B. However, to enable the MAPs and the management station to communicate, an additional access list definition must be created as follows: Topology A: Create an access list that permits HTTPS traffic to address This is the IP address of the management station. For example: access-list=320,accept,tcp, ,443 Topology B: The list should permit HTTPS traffic to address This is the IP address of the management station inside the VPN tunnel. access-list=320,accept,tcp, ,443 Create a MAP profile Define a RADIUS profile for each MAP. The profile should activate the access list that was defined in the MSC s RADIUS profile. For example: use-access-list=320 Create a user account for each MSC Define a RADIUS user account for each MSC. Define a unique username and password for each device
20 Chapter Management Chapter
21 Chapter 3: Public access deployment Chapter 3 Public access deployment In this chapter you can find sample deployment strategies for common public access scenarios. These scenarios can give you a good idea about how to approach your installation.
22 Chapter Public access deployment Chapter 3 In this chapter This chapter contains the following scenarios. Scenario/Topic See page Scenario 1a: Hotspot with Internet access (local mode) 23 Scenario 1b: Hotspot with custom interface (local mode) 26 Scenario 1c: Hotspot with satellites and roaming (local mode) 29 Scenario 1d: Hotspot with layer 2 security (local mode) 32 Scenario 2a: Hotspot with Internet access (AAA server) 35 Scenario 2b: Hotspot with custom interface (AAA server) 39 Scenario 2c: Hotspot with satellites and roaming (AAA server) 42 Scenario 2d: Hotspot with layer 2 security (AAA server) 45 Scenario 2e: Using dual radios to support A+B+G traffic 49 Scenario 3: Shared hotspot for public and private traffic 50 Scenario 4: Delivering custom HTML pages using VLANs (AAA server) 54 Scenario 5: Custom HTML pages on each MAP (local mode)
23 LAN port Internet port Chapter Public access deployment Chapter 3 Scenario 1a: Hotspot with Internet access (local mode) This installation shows you how to quickly deploy and test the MSC without installing a RADIUS server. Instead, customer authentication is handled locally on the MSC. How it works In this scenario a single MSC (with radio) is installed to provide a wireless network and access to the Internet. The MSC is connected to the Internet by way of a broadband modem, and the Internet connection is protected by the MSC s firewall and NAT features (which are enabled by default) LAN MSC 1.4 PUBLIC WL AN A local area network is connected to the MSC s LAN port to support wired customers. The MSC acts as the DHCP server on both the wireless and wired networks which are bridged together on subnet The MSC is operating in local mode, which means that: Customer authentication is handled locally by the MSC and accounts are created on the MSC for each customer. There is no support for accounting. A RADIUS server is not required to activate the public access interface. Instead, the default public access interface resident on the MSC is used by customers to login and manage their sessions
24 Chapter Public access deployment Chapter 3 Configuration road map Install the MSC 1. Install the MSC as described in its Quickstart guide. 2. Connect the Internet port to a broadband modem and then restart the modem. 3. Connect the LAN port to the local area network. 4. Start the management tool. Configure the wireless network By default the MSC is configured to: automatically choose the best operating channel (frequency) support b/g clients create a wireless network named Colubris Networks There is no need to change these settings for this scenario. Note: By default, one radio on the MSC-3300 is used to provide the wireless network and the other is placed into Monitor mode. Configure the Internet connection 1. Select Network > Ports > Internet port. 2. Select the addressing option supported by your ISP and click Configure. 3. Define all settings as required by your ISP. Define the list of users 1. Select Security > Users. 2. Add usernames and passwords for all users/customers. Test the public access interface To test your installation, use a wireless client station to log onto the public access interface. (For this to work, the MSC must be configured as the client s default gateway. This is done by default if the wireless client is using DHCP.) 1. Start the client station s web browser and enter the IP address (or domain name) of a web site on the Internet. 2. The MSC should intercept the URL and display the Login page. (Depending on the type of certificate that is installed on the MSC, you may see a security warning first.)
25 Chapter Public access deployment Chapter 3 3. Specify a valid customer name and password to login. 4. The Session page will open. 5. Next, you are automatically redirected to the web site you originally requested
26 LAN port Internet port Chapter Public access deployment Chapter 3 Scenario 1b: Hotspot with custom interface (local mode) This scenario adds custom settings to the default public access interface used in Scenario 1a. This installation illustrates how to customize the operation of the public access interface while running in local mode. How it works In this scenario, a web server is used to store custom pages for the public access interface. The MSC loads these pages each time it is restarted. There are two ways to deploy this scenario. Topology 1 In this version, the web server is located on the Internet. Web server LAN MSC 1.4 PUBLIC WL AN
27 LAN port Internet port Chapter Public access deployment Chapter 3 Topology 2 In this version the web server is located on local LAN B. Instead of being directly connected to the Internet, the MSC is also connected to local LAN B which provides a router/firewall to handle the connection to the Internet Web server 5.1 Router Firewall LAN A LAN B MSC 1.4 PUBLIC WL AN In this scenario, the web server is also the DHCP server for LAN B, operating on subnet The MSC s Internet port is set to operate as a DHCP client. Configuration road map Important: Start with the configuration defined in Scenario 1a. Configure the Internet port (Topology 2 only) 1. Select Network > Ports > Internet port. 2. Select DHCP Client and click Save. Customize the login page and logo 1. Create a folder called newpages on the web server. 2. Create a file called logo.gif that contains your logo and place it in the newpages folder (recommended size less than 20K). This same image file is shared by all pages. 3. Download the current QuickSetup.zip file from the Colubris Support website. (Go to and on the home page at left select Support > Product Registration.)
28 Chapter Public access deployment Chapter 3 4. Copy the following files from the current QuickSetup.zip file and place them in the newpages folder. login.html transport.html session.html fail.html 5. Edit login.html to meet the requirements of your site, keeping the following restrictions in mind: Do not alter the ID tags <!-- Colubris --> & <!-- Custom --> located at the top of the page. Do not alter any JavaScript code. 6. Open the Security > Local config page and define the following attributes: login-page=web_server_url/newpages/login.html transport-page=web_server_url/newpages/transport.html session-page=web_server_url/newpages/session.html fail-page=web_server_url/newpages/fail.html logo=web_server_url/newpages/logo.gif Test the public access interface To test your installation, use a wireless client station to log onto the public access interface. (For this to work, the MSC must be configured as the client s default gateway. This is done by default if the wireless client is using DHCP.) 1. Start the client station s web browser and enter the IP address (or domain name) of a web site on the Internet. 2. The MSC should intercept the URL and display the modified Login page. (Depending on the type of certificate that is installed on the MSC, you may see a security warning first.) 3. To login, specify a valid customer name and password. The Session page should open. 4. Next, you are automatically redirected to the web site you originally requested
29 LAN port Internet port Chapter Public access deployment Chapter 3 Scenario 1c: Hotspot with satellites and roaming (local mode) This scenario adds multiple MAPs to extend the wireless network in Scenario 1b. MAP devices can be used to extend the reach of the public access network created by an InMotion MultiService Controller (MSC). How it works In this scenario several MAP devices are connected to an MSC by way of a backbone LAN to provide multiple wireless cells for large physical location. Customers can log into the public access network at any location and can roam between access points without losing their connection. By default, each MAP is configured as a DHCP client and obtains its address from the MSC, which by default is configured as the DHCP server. Customer authentication is handled locally by the MSC, and accounts are created on the MSC for each customer. There is no support for accounting. Note: This scenario can also be created using an MSC with no radio, in which case wireless cells are only provided by the MAP devices. When using non-radio MSC units, the DHCP server option must be enabled manually on the MSC. The following diagrams illustrate how the two topologies described in Scenario 1b can be modified to support satellites and roaming. In both cases the configuration procedure is the same. Topology 1 Web server LAN MAP 1.9 MAP 1.8 MSC 1.1 PUBLIC WL AN PUBLIC WL AN 1.4 PUBLIC WL AN
30 LAN port Internet port Chapter Public access deployment Chapter 3 Topology Web server Router Firewall LAN A LAN B MAP 1.9 MAP 1.8 MSC PUBLIC WL AN PUBLIC WL AN 1.4 PUBLIC WL AN Configuration road map Important: Start with the configuration defined in Scenario 1a. Install the MAPs 1. Install the MAPs as described in the appropriate quickstart guide. 2. Before you connect each unit to the LAN, start the Management Tool and configure each unit as described in the sections that follow. Configure the wireless network By default the MAPs are configured to: support b/g clients automatically choose the best operating channel (frequency) create a wireless network named Colubris Networks There is no need to change these settings for this scenario. Note: All wireless networks must have the same name in order to support roaming. Set the shared secret on the MSC 1. Select Security > Authentication > Advanced Settings. 2. In the Access controller shared secret box, set Shared secret and Confirm shared secret to a unique string. For example: xr2t56. This password will be used by the MAPs to connect to the MSC when they send authentication requests. 3. Click Save
31 Chapter Public access deployment Chapter 3 Configure the connection to the MSC on the MAPs Each MAP will use the services of the MSC to authenticate customer logins. Do the following on each MAP. 1. Select VSC > Profiles. 2. Click the Colubris Networks profile to edit it. 3. In the General box, select the Use Colubris access controller check box. 4. Click Save. 5. Select Security > Access controller 6. Set the Access controller shared secret to match the secret set on the MSC. 7. Click Save. Note: By default the MAP is set up to use the default gateway assigned by DHCP as the access controller. Do not change this setting
32 LAN port Internet port Chapter Public access deployment Chapter 3 Scenario 1d: Hotspot with layer 2 security (local mode) This scenario adds support for WEP and WPA clients to scenario 1c. Enabling support for WEP and WPA helps to protect wireless transmissions against eavesdropping. How it works This scenario creates three virtual service communities (VSCs) on each device. Each VSC provides support for a different security option: WEP, WPA (with preshared key), and none. To connect with the wireless network, customers must select the SSID of the VSC that matches the option that they want to use. Roaming is supported, since the same VSCs are defined on all access points. The following diagrams illustrate how the two topologies described in Scenario 1c can be modified to support layer 2 security. In both cases the configuration procedure is the same. Topology Web server LAN SSID None MAP SSID WEP 1.5 SSID WPA SSID None MAP SSID WEP 1.4 SSID WPA SSID None MSC 1.1 SSID WPA SSID WEP
33 LAN port Internet port Chapter Public access deployment Chapter 3 Topology Web server Router Firewall LAN A LAN B SSID None MAP SSID WEP 1.5 SSID WPA SSID None MAP SSID WEP 1.4 SSID WPA SSID None MSC SSID WPA SSID WEP Configuration road map Important: Start with the configuration defined in Scenario 1c. Create VSCs on the MAPs Use the following steps to create three virtual service communities on all MAPs. 1. Select VSC > Profiles. 2. On the Virtual Service Communities page, click the Colubris Networks profile to edit it. 3. On the Add/Edit Virtual Service Community page: Under General, enter the Name as None. Under General, select the Use Colubris access controller check box. Under Virtual AP, enter the WLAN name (SSID) as None. Click Save. 4. On the Virtual Service Communities page, click Add new profile. 5. On the Add/Edit Virtual Service Community page: Under General, enter the Name as WEP. Under General, enable the Use Colubris access controller check box. Under Virtual AP, enter the WLAN name (SSID) as WEP. Under Wireless protection: Select the checkbox and choose WEP. For Key, specify 13 ASCII characters as the key. Click Save. 6. On the Virtual Service Communities page, click Add new profile
34 Chapter Public access deployment Chapter 3 7. On the Add/Edit Virtual Service Community page: Under General, enter the Name as WPA. Under General, select the Use Colubris access controller check box. Under Virtual AP, enter the WLAN name (SSID) as WPA. Under Wireless protection: Select the checkbox and leave the default setting of WPA. For Mode, select WPA or WPA2. For Key source, select Preshared key. For Key and Confirm key, set a unique key value. Click Save. Create VSCs on the MSC Use the following steps to create virtual service communities on the MSC that match each VSC you configured on the MAPs: 1. Select VSC > Profiles. 2. On the Virtual Service Communities page, click the Colubris Networks profile to edit it. 3. On the Add/Edit Virtual Service Community page: Under General, enter the Name as None. Under Virtual AP, enter the WLAN name (SSID) as None. Click Save. 4. On the Virtual Service Communities page, click Add new profile. 5. On the Add/Edit Virtual Service Community page: Under General, enter the Name as WEP. Under Virtual AP, enter the WLAN name (SSID) as WEP. Under Wireless protection: Select the checkbox and choose WEP. For Key, specify the same 13 ASCII characters you defined on the MAPs. Click Save. 6. On the Virtual Service Communities page, click Add new profile. 7. On the Add/Edit Virtual Service Community page: Under General, enter the Name as WPA. Under Virtual AP, enter the WLAN name (SSID) as WPA. Under Wireless protection: Select the checkbox and leave the default setting of WPA. For Mode, select WPA or WPA2. For Key source, select Preshared key. For Key and Confirm key, set the same unique key value you defined on the MAPs. Click Save
35 LAN port Internet port Chapter Public access deployment Chapter 3 Scenario 2a: Hotspot with Internet access (AAA server) This installation shows you how to create a public access network using an AAA (authentication, administration, accounting) RADIUS server to handle customer authentication. How it works In this scenario a single MSC is installed to provide a wireless network and access to the Internet. A local area network is connected to the MSC s LAN port to support wired customers. The MSC acts as the DHCP server on both the wireless and wired networks which are bridged together on subnet A RADIUS server (either local or remote) provides services for customer authentication and accounting. There are two ways to deploy this scenario as illustrated by topology 1 and topology 2 in the sections that follow. Topology 1 In this version, the NOC is located at a remote site and is accessed through the Internet. The MSC is connected to the Internet by way of a broadband modem, and the Internet connection is protected by the MSC s firewall and NAT features. The MSC connects to the VPN server at the NOC using its PPTP client. This provides a secure link through which data can be transferred. RADIUS server VPN server VPN tunnel myvpn.com LAN MSC 1.4 PUBLIC WL AN
36 LAN port Internet port Chapter Public access deployment Chapter 3 Topology 2 In this version the RADIUS server is located on local LAN B. Instead of being directly connected to the Internet, the MSC is also connected to local LAN B which provides a router/firewall to handle the connection to the Internet RADIUS server 5.1 Router Firewall LAN A LAN B MSC 1.4 PUBLIC WL AN Configuration road map On the RADIUS server Define RADIUS accounts for all customers that will use the public access network. Install the MSC 1. Install the MSC as described in its Quickstart guide. 2. If setting up Topology 1, connect the Internet port to a broadband modem and then restart the modem. If setting up Topology 2, connect the Internet port to LAN B. 3. Connect the LAN port to the local area network. 4. Start the management tool. Configure the wireless network By default the MSC is configured to: support b/g clients automatically choose the best operating channel (frequency) create a wireless network named Colubris Networks There is no need to change these settings for this scenario. Note: By default one radio on the MSC-3300 is used to provide the wireless network and the other is placed into Monitor mode
37 Chapter Public access deployment Chapter 3 Configure the Internet port 1. Select Network > Ports > Internet port. 2. Select the proper addressing option: For topology 1, select the option supported by your ISP (Topology 1) and click Configure. Define all settings as required. For topology 2, select DHCP client and click Save. Create a VPN connection (Topology 1 only) 1. Select Security > PPTP client. 2. Under Connection, set the PPTP server address to the address of the VPN server (in this example, myvpn.com. 3. Under Account, set Username and Password as required by the VPN server. 4. Click Save. Create a RADIUS profile 1. Select Security > RADIUS. 2. Click Add New Profile. 3. In the Profile name box, assign RADIUS Profile 1 to the new profile. 4. In the Settings box, use the defaults except for Authentication method which must match the method supported by the RADIUS server. 5. In the Primary RADIUS server box, specify the address of the RADIUS server and the secret the MSC will use. Enable RADIUS authentication of customers 1. Select VSC > Profiles. 2. On the Virtual Service Communities page, click the Colubris Networks profile to edit it. 3. On the Add/Edit Virtual Service Community page: Under HTML-based user logins,: Clear the Local authentication checkbox. Select the RADIUS authentication checkbox. For RADIUS profile, select RADIUS Profile 1. Select the RADIUS accounting checkbox. Click Save
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
More informationNBG2105. User s Guide. Quick Start Guide. Wireless Mini Travel Router. Default Login Details. Version 1.00 Edition 1, 11/2012
NBG2105 Wireless Mini Travel Router Version 1.00 Edition 1, 11/2012 Quick Start Guide User s Guide LAN IP Address Default Login Details 192.168.1.1 (Router Mode) 192.168.1.2 (Other Modes) Passwordwww.zyxel.com
More informationWiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
More informationMikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server
Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced
More informationChapter 1 Configuring Internet Connectivity
Chapter 1 Configuring Internet Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationChapter 3 Management. Remote Management
Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationWireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
More informationWireless G Broadband quick install
Wireless G Broadband Router quick install guide Model 503693 INT-503693-QIG-0608-02 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Router, Model 503693. This quick install
More informationHow To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
More informationUnified Access Point Administrator's Guide
Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November
More informationIEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1
IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationPePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400
PePWave Surf Series PePWave Surf Indoor Series: Surf 200, AP 200, AP 400 PePWave Surf Outdoor Series: Surf AP 200/400-X, PolePoint 400-X, Surf 400-DX User Manual Document Rev. 1.2 July 07 COPYRIGHT & TRADEMARKS
More informationNETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)
NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who
More informationChapter 4 Management. Viewing the Activity Log
Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in
More informationPreparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
More informationHow To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
More informationWRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1, 4 2014
WRE6505 Wireless AC750 Range Extender Version 1.00 Edition 1, 4 2014 2.4G 5G Quick Start Guide User s Guide Default Login Details LAN IP Address 192.168.1.2 User Name admin www.zyxel.com Password 1234
More informationP-660HWP-Dx. Quick Start Guide. 802.11g HomePlug AV ADSL2+ Gateway. Version 3.40 7/2007 Edition 1. Copyright 2007. All rights reserved.
P-660HWP-Dx 802.11g HomePlug AV ADSL2+ Gateway Quick Start Guide Version 3.40 7/2007 Edition 1 Copyright 2007. All rights reserved. Overview The P-660HWP-Dx is a gateway which combines high-speed ADSL
More informationP-660HN-51. 802.11n Wireless ADSL2+ 4-port Gateway DEFAULT LOGIN DETAILS. Firmware Version 1.10 Edition 1, 9/2010. IP Address: http://192.168.1.
P-660HN-51 802.11n Wireless ADSL2+ 4-port Gateway Firmware Version 1.10 Edition 1, 9/2010 DEFAULT LOGIN DETAILS IP Address: http://192.168.1.1 User Name: admin Password: 1234 www.zyxel.com Copyright 2010
More informationDSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
More informationSteps for Basic Configuration
1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.
More informationASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide
ASUS WL-5XX Series Wireless Router Internet Configuration User s Guide Contents Chapter 1 Introduction:...1 Chapter 2 Connecting the wireless router...1 Chapter 3 Getting to know your Internet connection
More informationInstalling Cable Modem Software Drivers
Configuration Installing Cable Modem Software Drivers Windows 98SE Operating System Windows Me Operating System Windows 2000 Operating System Windows XP Operating System Wireless LAN Configuration Telnet
More informationGWA501 package contains: 1 Wireless-G Broadband Gateway 1 Power Adapter 1 Ethernet Cable 1 Manual CD 1 Quick Start Guide 1 Warranty/Registration Card
Wireless-G Broadband Gateway GWA501 Quick Start Guide Read this guide thoroughly and follow the installation and operation procedures carefully to prevent any damage to the unit and/or any of the devices
More informationChapter 1 Configuring Basic Connectivity
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration
More informationBASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
More informationCONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router
CONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router About This Manual This manual provides descriptions of the Conceptronic C54BRS4A 802.11g Wireless Broadband Router, its hardware and software features,
More informationTechnical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
More informationGWA502 package contains: 1 Wireless-G Broadband Router 1 Power Adapter 1 Ethernet Cable 1 Manual CD 1 Quick Start Guide 1 Warranty/Registration Card
Wireless-G Broadband Router GWA502 Quick Start Guide Read this guide thoroughly and follow the installation and operation procedures carefully to prevent any damage to the unit and/or any of the devices
More informationN300 WiFi Range Extender WN2000RPT User Manual
N300 WiFi Range Extender WN2000RPT User Manual December 2013 202-11333-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,
More informationHardware overview. Package contents MSM310, documentation, two 2.4-GHz (2-dBi) / 5-GHz (2-dBi) dual-mode omnidirectional antennas.
VIEW Certified The MSM310 is a Wi-Fi Alliance authorized Wi-Fi CERTIFIED 802.11a/b/g product. The Wi-Fi CERTIFIED Logo is a certification mark of the Wi-Fi Alliance. The MSM310 is certified under the SpectraLink
More informationIntel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
More informationInitial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
More informationChapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
More informationManagement Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
More informationHalf Bridge mode }These options are all found under Misc Configuration
Securing Your NB1300 - Once connected. There are eleven areas that need your attention to secure your NB1300 from unauthorised access - these areas or features are; Physical Security Admin Password User
More informationConfiguration Guide. How to Configure SSL VPN Features in DSR Series. Overview
Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be
More informationInterlink Networks Secure.XS and Cisco Wireless Deployment Guide
Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS
More informationConfiguration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationN450 Wireless Router WNR2500
User Manual September 2013 202-11311-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate the serial number on the
More informationApple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
More informationV310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
More informationQuick Installation Guide
V2.01 IP Wired / Wireless Camera Quick Installation Guide (For Windows OS) Model: FI8602/FI8602W ShenZhen Foscam Intelligent Technology Co., Ltd Packing List Quick Installation Guide 1) IP CAMERA X 1 2)
More informationN300 Wireless Router WNR2000v4 User Manual
User Manual March 2014 202-11229-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on the label
More informationConfiguring Settings on the Cisco Unified Wireless IP Phone 7925G
CHAPTER 5 Configuring Settings on the Cisco Unified Wireless IP Phone 7925G This chapter describes the available configuration settings on the Cisco Unified Wireless IP Phone 7925G. It contains the following
More informationLevelOne WAP - 0005. User s Manual. 108 Mbps Wireless Access Point
LevelOne WAP - 0005 108 Mbps Wireless Access Point User s Manual TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 1 Features of your Wireless Access Point... 1 Package Contents... 3 Physical Details... 3 CHAPTER
More informationChapter 2 Connecting the FVX538 to the Internet
Chapter 2 Connecting the FVX538 to the Internet Typically, six steps are required to complete the basic connection of your firewall. Setting up VPN tunnels are covered in Chapter 5, Virtual Private Networking.
More informationMultifunctional Broadband Router User Guide. Copyright Statement
Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright
More informationThis section will focus on basic operation of the interface including pan/tilt, video, audio, etc.
Catalogue Basic Operation... 2 For Internet Explorer... 2 For Other Non-IE Web Browsers... 5 Camera Settings... 6 System... 6 About... 6 PT Setting... 7 Backup and Restore Setup... 8 NTP Setting... 8 System
More informationApplication Note Startup Tool - Getting Started Guide
Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationLayer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation
Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S
More informationConfiguring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
More informationP-2302HWUDL-P1. Quick Start Guide. 802.11g Wireless VoIP Station Gateway. with Built-in DECT Base Station
P-2302HWUDL-P1 802.11g Wireless VoIP Station Gateway with Built-in DECT Base Station Quick Start Guide Version 3.60 Edition 1 3/2007 Overview The P-2302HWUDL-P1 model is a router with IEEE 802.11g wireless
More informationConfiguring a BEC 7800TN Wireless ADSL Modem
Configuring a BEC 7800TN Wireless ADSL Modem Setting Up the PC Logging into BEC Configuring Wireless Setup Setup Static IP Setup Main Port Finished Firmware Update ATTENTION! Before the modem is programmed
More informationAP6511 First Time Configuration Procedure
AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the
More informationWireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
More informationQuick Installation Guide of WLAN Broadband Router
To avoid users without access right through your WLAN Broadband Router, suggest that use security mechanism like WEP, WPA or set ID/password for web configuration login IP address 192.168.1.254. Preparation
More informationChapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
More informationNBG6815. User s Guide. AC2200 MU-MIMO Dual-Band Wireless Gigabit Router. Quick Start Guide. Default Login Details. Version 1.00 Edition 1, 02/2016
NBG6815 AC2200 MU-MIMO Dual-Band Wireless Gigabit Router Version 1.00 Edition 1, 02/2016 Quick Start Guide User s Guide Default Login Details LAN IP http://192.168.1.1 Address (Router Mode) www.zyxel.comhttp://192.168.1.2
More informationUnified Access Point (AP) Administrator s Guide
Unified Access Point (AP) Administrator s Guide Product Model : DWL-3500AP DWL-8500AP Unified Wired & Wireless Access System Release 2.1 February 2008 Copyright 2008. All rights reserved. D-Link Unified
More informationHillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
More informationUIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
More informationQuick Start Guide for Zone Director Controller
Quick Start Guide for Zone Director Controller Version 1.0 Copyright 2012, Wifi-Soft Solutions All rights reserved. Purpose of this document 1. This document should be used in conjunction with Zone Director
More information10/2011 - English Edition 1. Quick Start Guide. NWA1100N-CE CloudEnabled Business N Wireless Access Point
10/2011 - English Edition 1 Quick Start Guide NWA1100N-CE CloudEnabled Business N Wireless Access Point Package Contents - 1 x ZyXEL NWA1100N-CE Access Point - 2 x Detachable Antennas - 1 x Power Adapter
More informationSTATIC IP SET UP GUIDE
STATIC IP SET UP GUIDE VERIZON D-LINK 2750B & ACTIONTEC GT784 WNV WIRELESS GATEWAY Verizon High Speed Internet for Business Verizon High Speed Internet for Business YOUR NEW STATIC IP CONNECTION AND SET
More informationQuick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business
Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome
More informationUser Manual. PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400. PePWave Mesh Connector Indoor Series: MC 200, E200, 400
User Manual PePWave Surf / Surf AP Indoor Series: Surf 200, E200, AP 200, AP 400 PePWave Mesh Connector Indoor Series: MC 200, E200, 400 PePWave Surf AP Series: Surf AP 200-X, E200-X, 400-X PePWave Surf
More informationWAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015
WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 10/2015 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup Password www.zyxel.com 1234 Copyright 2014 ZyXEL
More informationIntegrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
More informationRouter Setup Manual. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10060-01 2006-03-17
NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10060-01 2006-03-17 2006 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR is a trademark of Netgear, Inc. Microsoft, Windows,
More informationNBG6816. User s Guide. Quick Start Guide. Simultaneous Dual-Band Wireless AC2350 Ultra HD Media Router. Default Login Details
NBG6816 Simultaneous Dual-Band Wireless AC2350 Ultra HD Media Router Version 1.00 Edition 1, 03/2015 Quick Start Guide User s Guide Default Login Details LAN IP http://192.168.1.1 Address (Router Mode)
More informationAbstract. Overview. Features and Benefits T P P A P P N O T E
T P P A P P N O T E Product: ShoreTel Trapeze Networks TPP: 10090 Date: March 2010 System version: ShoreTel 10.1 Trapeze MSS 7.0.3.0 Abstract Trapeze Networks provides the Wireless LAN infrastructure to
More informationConfigure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
More informationLinksys Wireless G WRT54G
Router Configuration Note Linksys Wireless G WRT54G Version 1.0 Scope This document describes how to configure the Linksys Wireless G WRT54G router to work with LucidLink Wireless Security Software, version
More informationUser guide for NANOSTATION 2
User guide for NANOSTATION 2 1. Connecting hardware. Connecting your Nanostation 2 to your network is very easy, as it s using the POE (Power Over Ethernet) technology. For this you will need two direct
More informationWRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012
WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright
More informationLinksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
More informationWireless-N. User Guide. Broadband Router WRT300N (EU/LA) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N Broadband Router User Guide Model No. WRT300N (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark
More informationUnified Access Point Administrator s Guide
Page 1 Table of Contents Section 1 - About This Document...9 Document Organization... 9 Additional Documentation... 9 Document Conventions... 9 Online Help, Supported Browsers, and Limitations... 10 Section
More informationConfiguring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
More informationProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
More informationVPN Configuration Guide. Dell SonicWALL
VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of
More informationMobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
More informationHow To Set Up A Computer With A Network Connection On A Cdrom 2.5 (For A Pc) Or Ipad (For Mac) On A Pc Or Mac Or Ipa (For Pc) On An Ipad Or Ipro (
Connect the supplied power-adapter to the power inlet port and connect it to a wall outlet. Then, the router automatically enters the self-test phase. During self-test phase, RNX-EasyN400 s Power LED will
More informationHow To Configure L2TP VPN Connection for MAC OS X client
How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used
More informationWireless-N. User Guide. Broadband Router WRT300N WIRELESS. Model No.
2.4 GHz WIRELESS Wireless-N Broadband Router User Guide Model No. WRT300N Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
More informationCustomer Installation Guide NBG-4615 v2 ZyXEL Wireless Router
Customer Installation Guide NBG-4615 v2 ZyXEL Wireless Router Form #496PTC Rev. 09/2013 Hardware Installation 1. First, connect the DSL modem to the WAN port, located on the back of the NBG-4615 v2, on
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More informationWireless LAN Device Series
Wireless LAN Device Series High-Power 400mW 802.11b/g Router AIP-610H User Manual Version. 6.1 Preface This guide is for the networking professional who installs and manages the AIP-W610H product hereafter
More informationHow to Create a Basic VPN Connection in Panda GateDefender eseries
How to Create a Basic VPN Connection in Panda GateDefender eseries Support Documentation How-to guides for configuring VPNs with Panda GateDefender eseries Panda Security wants to ensure you get the most
More informationA Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.
A Division of Cisco Systems, Inc. WIRELESS Wireless-G Broadband Router User Guide Model No. WRT54GL (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
More informationMobile Router MR600 User Guide
Mobile Router MR600 User Guide HANTZ + PARTNER The Upgrade Company! www.hantz.com 1. Connections and LEDS The following pictures show you various connectors and status LED indicators on the MR600 Mobile
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
More informationStoneGate Installation Guide
SMC FW IPS SSL VPN VPN StoneGate Installation Guide SOHO Firewalls Updated for StoneGate Management Center 5.0.0 Legal Information End-User License Agreement The use of the products described in these
More informationSOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0
SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0 Before You Begin Before you install the SOHO 6 Wireless, you must have: A computer with a 10/100BaseT Ethernet card
More information