Configure WorkGroup Bridge on the WAP131 Access Point



Similar documents
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wireless Network Configuration Guide

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone

Connecting to UNOSECURE using Windows 7

Chapter 3 Safeguarding Your Network

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Chapter 2 Wireless Settings and Security

Configuring the WT-4 for ftp (Infrastructure Mode)

Instructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

User Guide for eduroam

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Abstract. Avaya Solution & Interoperability Test Lab

NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details

Microsoft Lync Certification Configuration Guide for WiNG 5.5

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

Wireless LAN Client Configuration Guide for Windows Configuring 802.1X Authentication Client for Windows 7

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

Chapter 2 Configuring Your Wireless Network and Security Settings

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

The next generation of knowledge and expertise Wireless Security Basics

Wireless-G Business PCI Adapter with RangeBooster

Case Study - Configuration between NXC2500 and LDAP Server

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

11g WiFi ADSL Router. WL-AM604g ! User Manual

HP M n Access Point Configuration and Administration Guide

Massey University Wireless Network - Client

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.

Lab Configuring LEAP/EAP using Local RADIUS Authentication

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

User s Manual. Wireless LAN Access Point. Model No.: SP918GK

Application Note User Groups

Chapter 3 Management. Remote Management

Security. TestOut Modules

Configuring the WT-4 for ftp (Ad-hoc Mode)

Question How do I access the router s web-based setup page? Answer

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

WIRELESS SETUP FOR WINDOWS 7

How to Access Coast Wi-Fi

ADMINISTRATION GUIDE. Cisco Small Business. WAP371 Wireless-AC/N Dual Radio Access Point with Single Point Setup

USER GUIDE Cisco Small Business

HIGH PERFORMANCE WIRELESS ADAPTER

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

Wireless LAN Access Point

WAP561 Wireless-N Selectable-Band Access Point with PoE

Mac OS X Secure Wireless Setup Guide

Wi- Fi settings for Windows XP

CTS2134 Introduction to Networking. Module Network Security

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

CruzNet Secure Set-Up Instructions for Windows Vista

MN-700 Base Station Configuration Guide

Table of Contents. Product Overview...5

United States Trustee Program s Wireless LAN Security Checklist

Connecting to Secure Wireless (iitk-sec) on Fedora

Cisco Aironet Wireless Bridges FAQ

Long-Range 500mW IEEE g Wireless USB Adapter. User's Guide

Document Created by Nick Schuster

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

WAP321 Wireless-N Selectable-Band Access Point with PoE

Eduroam wireless network Windows Vista

Canterbury College Eduroam Wi-Fi Guide

TRENDnet User s Guide. Cover Page

Setting Up Your Personally- Owned Computer

Configuring Your Network s Security

EW-7438RPn V2 User Manual

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

9 Simple steps to secure your Wi-Fi Network.

Instructions for accessing the new TU wireless Network

Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services a...

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

P r o t o l ck w fi ma a n ger User s Guide

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Configuring Security Solutions

Configuring a BEC 7800TN Wireless ADSL Modem

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7

LONG RANGE WIRELESS ACCESS POINT / CLIENT BRIDGE

FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops

Chapter 4 Management. Viewing the Activity Log

ALL Mbits Powerline WLAN N Access Point. User s Manual

Chapter 6 Using Network Monitoring Tools

Using WPA Enterprise on Windows XP to Access Cleveland State University s Wireless Network (WoWnet)

WRE6505. User s Guide. Quick Start Guide. Wireless AC750 Range Extender. Default Login Details. Version 1.00 Edition 1,

Wireless Local Area Networks (WLANs)

Configuring Routers and Their Settings

IEEE A/G Access Point

Network Services One Washington Square, San Jose, CA

Transcription:

Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless LAN that is connected with the workgroup bridge mode. The WAP device associated with the remote interface is known as an access point interface, and the one associated with the wireless LAN is called an infrastructure interface. Although the Wireless Distribution System (WDS) is the preferred bridge solution for the WAP131, the Workgroup Bridge Mode is recommended when the WDS feature is unavailable.

Note: When the Workgroup Bridge feature is enabled, the WDS bridge feature does not work. To see how WDS Bridge is configured, refer to the article Configuring Wireless Distribution System (WDS) Bridge on the WAP131 and WAP351. The objective of this document is to explain how to configure the Workgroup Bridge on WAP131 access point. Applicable Devices WAP131 Software Version 1.0.3.4 Configure Work Group Bridge Note: In order to enable Workgroup Bridge, clustering must be enabled in the WAP. If clustering is disabled, you need to disable Single Point Setup to enable clustering. All WAP devices that take part in the Workgroup Bridge must have the following identical settings: Radio, IEEE 802.11 mode, Channel Bandwidth, Channel (auto not recommended). To ensure these settings in all devices are the same, look up the radio settings. To configure these settings, refer to the article Configuring Basic Radio Settings on the WAP131 and WAP351. Step 1. Log in to the Web Configuration Utility and choose Wireless > WorkGroup Bridge. The WorkGroup Bridge page opens:

Step 2. Check the Enable checkbox in the WorkGroup Bridge Mode field to enable the workgroup bridge feature.

Radio Settings Step 1. Select the radio interface for the work group bridge. When you configure one radio as a workgroup bridge, the other radio remains operational. The radio interfaces correspond to the radio frequency bands of the WAP131. The WAP131 is equipped to broadcast on two different radio interfaces. Configuring settings for one radio interface will not affect the other. Infrastructure Client Interface Step 1. Enter the Service Set Identifier (SSID) name in the SSID field. The SSID must be 2-32 characters long. Step 2. Choose the type of security to authenticate a client station on the upstream WAP device from the Security drop-down list. The available options are defined as follows:

None Open or no security. This is the default value. If you choose this, skip to Step 14. WPA Personal WPA Personal can support keys of length 8-63 characters. The encryption method is RC4 for WPA and Advanced Encryption Standard (AES) for WPA2. WPA2 is recommended as it has a more powerful encryption standard. If you choose this, go to Step 3. WPA Enterprise WPA Enterprise is more advanced than WPA Personal and is the recommended security for authentication. It uses Protected Extensible Authentication Protocol (PEAP) and Transport Layer Security (TLS). If you choose this, go to Step 5. WPA Personal Step 3. Select the WPA-TKIP or WPA2-AES checkbox to determine which kind of WPA encryption the infrastructure client interface will use. If all of your wireless equipment supports WPA2, then set the infrastructure client security for WPA2-AES. If some of your wireless devices, like PDAs and other small wireless network devices, only connect with WPA-TKIP, then select WPA-TKIP. Step 4. Enter in the WPA encryption key in the Key field. The key must be 8-63 characters long. Skip to Step 14.

WPA Enterprise Step 5. Select the WPA-TKIP or WPA2-AES checkbox to determine which kind of WPA encryption the infrastructure client interface will use. If all of your wireless equipment support WPA2, then set the infrastructure client security for WPA2-AES. If some of your wireless devices can only connect with WPA-TKIP, then check both the WPA-TKIP and WPA2-AES checkboxes. In this configuration, your WPA2 devices will connect to WPA2, and your WPA devices will connect to WPA. Step 6. In the EAP Method field, select either the PEAP or TLS radio button. The Protected Extensible Authentication Protocol (PEAP) gives each wireless user under the WAP individual usernames and passwords that support AES encryption

standards. Transport Layer Security (TLS) requires each user to have an additional certificate to be granted access. If you select PEAP, skip to Step 14. Step 7. Enter the username and password in the Username and Password field. Step 8. Select either the HTTP or TFTP radio buttons in the Transfer Method field. Trivial File Transfer Protocol (TFTP) is a simplified unsecure version of File Transfer Protocol (FTP). It is mainly used to distribute software or authenticate devices among corporate networks. Hypertext Transfer Protocol (HTTP) provides a simple

challenge-response authentication framework that can be used by a client to provide authentication framework. If you select TFTP, skip to Step 11. Note: If a certificate file is already present on the WAP, then the Certificate File Present and Certificate Expiration Date field will already be filled in with the relevant information. Otherwise, they will be blank. HTTP Step 9. Click the Browse button to find and select a certificate file. The file must have the proper certificate file extension (such as.pem or.pfx), otherwise the file will not be accepted.

Step 10. Click Upload to upload the selected certificate file. Skip to Step 14.

The Certificate File Present and Certificate Expiration Date field will be updated automatically.

TFTP Step 11. Enter the filename of the certificate file in the Filename field.

Step 12. Enter the TFTP Server address in the TFTP Server IPv4 Address field.

Step 13. Click the Upload button to upload the specified certificate file.

The Certificate File Present and Certificate Expiration Date field will be updated automatically.

Step 14. Enter the VLAN ID for the infrastructure client interface. Access Point Interface Step 1. Check the Enable checkbox in the Status field to enable bridging on the access point interface.

Step 2. Enter the Service Set Identifier (SSID) for the access point in the SSID field. The SSID length must be between 2 to 32 characters. Step 3. (Optional) If you do not want to broadcast the downstream SSID, uncheck the Enable checkbox in the SSID Broadcast field. It is enabled by default.

Step 4. Choose the type of security to authenticate downstream client stations to the WAP device from the Security drop-down list. The available options are defined as follows: None Open or no security. This is the default value. Skip to Step 10 if you choose this. WPA Personal WPA Personal and can support keys of length 8 to 63 characters. The encryption method is either Temporal Key Integrity Protocol (TKIP) or Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP). WPA2 with CCMP is recommended as it has a more powerful encryption standard, Advanced Encryption Standard (AES) compared to the TKIP that uses only a 64-bit RC4 standard. Step 5. Check the desired WPA versions from the WPA Versions field. Usually, WPA is only chosen if some of the WAPs involved do not support WPA2; otherwise, WPA2 is recommended. WPA2-AES is always enabled.

Step 6. Enter the shared WPA key in the Key field. The key must be 8-63 characters long, and can include alphanumeric characters, upper and lower case characters, and special characters. Step 7. Enter the rate in the Broadcast Key Refresh Rate. The rate must be between 0-86400, with a value of 0 disabling the feature. The default is 300.

Step 8. Choose the type of MAC filtering you wish to configure for the access point interface from the MAC Filtering drop-down list. When enabled, users are granted or denied access to the WAP based on the MAC address of the client they use. The available options are defined as follows: Disabled All clients can access the upstream network. This is the default value. Local The set of clients that can access the upstream network is restricted to the clients specified in a locally defined MAC address list. Radius The set of clients that can access the upstream network is restricted to the clients specified in a MAC address list on a RADIUS server. Step 9. Enter the VLAN ID in the VLAN ID field for the access point client interface.

Note: To allow the bridging of packets, the VLAN configuration for the access point interface and wired interface should match that of the infrastructure client interface. Step 10. Click Save to save your changes. 2015 Cisco Systems, Inc. All rights reserved.