Cisco AP541N Dual-band Single-radio Access Point Administration ...
Cisco AP541N Dual-band Single-radio Access Point Administration ... Cisco AP541N Dual-band Single-radio Access Point Administration ...
4WirelessModifying Virtual Access Point SettingsTable 16FieldWPA Enterprise Field DescriptionsDescriptionWPA VersionsSelect the types of client stations you want to support:• WPA. If all client stations on the network support theoriginal WPA but none support the newer WPA2, thenselect WPA.• WPA2. If all client stations on the network supportWPA2, we suggest using WPA2, as it provides thebest security by supporting the IEEE 802.11i standard.• WPA and WPA2. If you have a mix of clients, some ofwhich support WPA2 and others which support onlythe original WPA, select both WPA and WPA2. This letsboth WPA and WPA2 client stations associate andauthenticate, but uses the more robust WPA2 forclients that support it. This WPA configuration allowsmore interoperability, at the expense of some security.EnablepreauthenticationIf in WPA Versions you selected only WPA2 or both WPA andWPA2, you can enable pre-authentication for WPA2 clients.Click Enable pre-authentication if you want WPA2 wirelessclients to send a pre-authentication packet. The preauthenticationinformation is relayed from the access pointthe client is using to the target access point. Enabling thisfeature can speed up authentication for roaming clients thatconnect to multiple access points.This option does not apply if you selected only WPA for WPAVersions because WPA does not support this feature.73 Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide
WirelessModifying Virtual Access Point Settings4Table 16FieldWPA Enterprise Field DescriptionsDescriptionCipher SuitesSelect the cipher suite you want to use:• TKIP• CCMP (AES)• TKIP and CCMP (AES)By default both TKIP and CCMP are selected. When bothTKIP and CCMP are selected, client stations configured touse WPA with RADIUS must have one of the following:• A valid TKIP RADIUS IP address and RADIUS Key• A valid CCMP (AES) IP address and RADIUS KeyActive ServerDisplays which RADIUS server is in use. You can manuallychange from this server to a different server by selecting thedesired server in the dropdown box.NOTE: The Active Server is not stored across reboots. Thefirst configured RADIUS server is selected when the deviceis rebooted or reset.Use GlobalRADIUS ServerSettingsBy default each VAP uses the global RADIUS settings thatyou define for the access point at the top of the VAP page.However, you can configure each VAP to use a different set ofRADIUS servers.To use the global RADIUS server settings, make sure thecheck box is selected.To use a separate RADIUS server for the VAP, clear the checkbox and enter the RADIUS server IP address and key in thefields.RADIUS IPAddressRADIUS IPAddress 1–3Enter the address for the primary RADIUS server for this VAP.Enter up to three IPv4 addresses to use as the backupRADIUS servers for this VAP.If authentication fails with the primary server, eachconfigured backup server is tried in sequence.Cisco AP 541N Dual-band Single-radio Access Point Quick Start Guide 74
- Page 25 and 26: Getting StartedWireless Client Requ
- Page 27 and 28: Getting StartedConfiguring Security
- Page 29 and 30: 2StatusThe Status page provides inf
- Page 31 and 32: 2Table 3FieldDevice Information Pag
- Page 33 and 34: StatusTraffic Statistics2Figure 7Vi
- Page 35 and 36: StatusAssociated Clients2Associated
- Page 37 and 38: StatusRogue AP Detection2Link Integ
- Page 39 and 40: StatusRogue AP Detection2Table 6Fie
- Page 41 and 42: StatusRogue AP Detection2Table 6Fie
- Page 43 and 44: 3SetupLAN SettingsThe default wired
- Page 45 and 46: 3Table 7 describes the fields to vi
- Page 47 and 48: SetupConfiguring 802.1X Authenticat
- Page 49 and 50: SetupEnabling the Network Time Prot
- Page 51 and 52: SetupEnabling the Network Time Prot
- Page 53 and 54: SetupEnabling the Network Time Prot
- Page 55 and 56: 4WirelessModifying Wireless Radio S
- Page 57 and 58: 4Table 10FieldModeRadio Settings Fi
- Page 59 and 60: WirelessModifying Virtual Access Po
- Page 61 and 62: WirelessModifying Virtual Access Po
- Page 63 and 64: WirelessModifying Virtual Access Po
- Page 65 and 66: WirelessModifying Virtual Access Po
- Page 67 and 68: WirelessModifying Virtual Access Po
- Page 69 and 70: WirelessModifying Virtual Access Po
- Page 71 and 72: WirelessModifying Virtual Access Po
- Page 73 and 74: WirelessModifying Virtual Access Po
- Page 75: WirelessModifying Virtual Access Po
- Page 79 and 80: WirelessClient Connection Control4C
- Page 81 and 82: WirelessClient Connection Control4T
- Page 83 and 84: WirelessModifying Advanced Settings
- Page 85 and 86: WirelessModifying Advanced Settings
- Page 87 and 88: WirelessModifying Advanced Settings
- Page 89 and 90: WirelessModifying Advanced Settings
- Page 91 and 92: WirelessModifying Advanced Settings
- Page 93 and 94: WirelessModifying Advanced Settings
- Page 95 and 96: WirelessConfiguring the Wireless Di
- Page 97 and 98: WirelessConfiguring the Wireless Di
- Page 99 and 100: WirelessBandwidth Utilization4Bandw
- Page 101 and 102: WirelessConfiguring Quality of Serv
- Page 103 and 104: WirelessConfiguring Quality of Serv
- Page 105 and 106: WirelessConfiguring Quality of Serv
- Page 107 and 108: 5SNMPConfiguring SNMP on the Access
- Page 109 and 110: 5Table 25FieldSNMP Settings (Contin
- Page 111 and 112: SNMPConfiguring SNMP on the Access
- Page 113 and 114: SNMPConfiguring SNMP on the Access
- Page 115 and 116: SNMPConfiguring SNMP on the Access
- Page 117 and 118: SNMPConfiguring SNMP on the Access
- Page 119 and 120: SNMPSNMP Targets5NOTEAfter you conf
- Page 121 and 122: 6AdministrationAdministratorUse thi
- Page 123 and 124: 6Access Point ConfigurationThe acce
- Page 125 and 126: AdministrationAccess Point Configur
WirelessModifying Virtual <strong>Access</strong> <strong>Point</strong> Settings4Table 16FieldWPA Enterprise Field DescriptionsDescriptionCipher SuitesSelect the cipher suite you want to use:• TKIP• CCMP (AES)• TKIP and CCMP (AES)By default both TKIP and CCMP are selected. When bothTKIP and CCMP are selected, client stations configured touse WPA with RADIUS must have one of the following:• A valid TKIP RADIUS IP address and RADIUS Key• A valid CCMP (AES) IP address and RADIUS KeyActive ServerDisplays which RADIUS server is in use. You can manuallychange from this server to a different server by selecting thedesired server in the dropdown box.NOTE: The Active Server is not stored across reboots. Thefirst configured RADIUS server is selected when the deviceis rebooted or reset.Use GlobalRADIUS ServerSettingsBy default each VAP uses the global RADIUS settings thatyou define for the access point at the top of the VAP page.However, you can configure each VAP to use a different set ofRADIUS servers.To use the global RADIUS server settings, make sure thecheck box is selected.To use a separate RADIUS server for the VAP, clear the checkbox and enter the RADIUS server IP address and key in thefields.RADIUS IPAddressRADIUS IPAddress 1–3Enter the address for the primary RADIUS server for this VAP.Enter up to three IPv4 addresses to use as the backupRADIUS servers for this VAP.If authentication fails with the primary server, eachconfigured backup server is tried in sequence.<strong>Cisco</strong> AP 541N <strong>Dual</strong>-<strong>band</strong> <strong>Single</strong>-<strong>radio</strong> <strong>Access</strong> <strong>Point</strong> Quick Start Guide 74