Resumen del contenido incluido en la página 1
®
Enterasys RoamAbout
Wireless Networking
RBT-4102 Wireless Access Point
Configuration Guide
P/N 9034186-05
Resumen del contenido incluido en la página 2
Resumen del contenido incluido en la página 3
Notice EnterasysNetworks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult EnterasysNetworks to determine whether any such changes have been made. The hardware, firmware, or software described in this document is subject to change without notice. IN NO EVENT SHALL ENTERASYSNETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER
Resumen del contenido incluido en la página 4
Enterasys Networks, Inc. Firmware License Agreement BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc., on behalf of itself and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys software program/firmware (including any accompanying documentation, hardware or media) (“Program”)
Resumen del contenido incluido en la página 5
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Section 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau, Moldova,
Resumen del contenido incluido en la página 6
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement
Resumen del contenido incluido en la página 7
Enterasys Networks, Inc. Software License Agreement This document is an agreement (“Agreement”) between You, the end user, and Enterasys Networks, Inc. on behalf of itself and its Affiliates (“Enterasys”) that sets forth your rights and obligations with respect to the software contained in CD‐ROM or other media. “Affiliates” means any person, partnership, corporation, limited liability company, or other form of enterprise that directly or indirectly through one or more intermediaries, control
Resumen del contenido incluido en la página 8
to Enterasys. 5. PROTECTION AND SECURITY.In the performance of this Agreement or in contemplation thereof, You and your employees and agents may have access to private or confidential information owned or controlled by Enterasys relating to the Licensed Materials supplied hereunder including, but not limited to, product specifications and schematics, and such information may contain proprietary details and disclosures. All information and data so acquired by You or your employees or agents u
Resumen del contenido incluido en la página 9
9. UNITED STATES GOVERNMENT RESTRICTED RIGHTS.The Licensed Materials (i) were developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227‐19 (a) through (d) of the Commercial Computer Software‐Restricted Rights Clause and its successors, and (iii) in all respects is data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Licensed Materials are proprietary considered commer
Resumen del contenido incluido en la página 10
viii
Resumen del contenido incluido en la página 11
Contents Preface Purpose of This Manual ...................................................................................................................................xiii Intended Audience ...........................................................................................................................................xiii Firmware Version Support ...............................................................................................................................xiii Assoc
Resumen del contenido incluido en la página 12
Using Web Management to Configure Authentication ...........................................................................4-16 Using the CLI to Configure Authentication .............................................................................................4-17 Filter Control and VLANs ..............................................................................................................................4-18 Using Web Management to Configure Filter Control and VLANs ................
Resumen del contenido incluido en la página 13
Security .........................................................................................................................................................4-78 Wired Equivalent Privacy (WEP) ............................................................................................................4-79 Using Web Management to Configure Security Settings .......................................................................4-79 Using the CLI to Configure WPA Pre-Shared Key ...............
Resumen del contenido incluido en la página 14
xii
Resumen del contenido incluido en la página 15
Preface Purpose of This Manual This manual provides configuration instructions for the RoamAbout RBT‐4102 Access Point using Web management and the Command Line Interface (CLI). For complete CLI information, refer to the Enterasys RoamAbout RBT‐4102 Wireless Access Point Command Line Interface Reference Guide. Intended Audience This manual is intended for the wireless network manager who will configure the Enterasys RoamAbout 4102 Access Point. You should have a basic knowledge of Local Area
Resumen del contenido incluido en la página 16
The following conventions are used in the text of this document: Convention Description Bold font Indicates mandatory keywords, parameters or keyboard keys. italic font Indicates complete document titles, and command parameters. Courier font Used for examples of information displayed on the screen. Courier font in italics Indicates a user-supplied value, either required or optional. [ ] Square brackets indicate an optional value. { } Braces indicate required values. One or more value may be requ
Resumen del contenido incluido en la página 17
1 Introduction Overview The RoamAbout RBT‐4102, RBT‐4102‐BG, and RBT‐4102‐EU, are IEEE 802.11a/b/g access points that provide transparent, wireless high‐speed data communications between the wired LAN (WLAN) and fixed or mobile devices equipped with an 802.11a, 802.11b, or 802.11g wireless adapter. This solution offers fast, reliable wireless connectivity with considerable cost savings over wired LANs (which include long‐term maintenance overhead for cabling). Using 802.11a and 802.11g tech
Resumen del contenido incluido en la página 18
Features Features The features and benefits of the RBT‐4102 include the following: •Local network connection via 10/100 Mbps Ethernet ports or 54 Mbps wireless interface (supporting up to 255 mobile users per radio). • IEEE 802.11a, 802.11b, and 802.11g compliant. •Rogue AP Detection provides the ability to scan the airwaves and collect information about access points in the area. This feature detects neighboring access points and access points not authorized to participate in the network. •
Resumen del contenido incluido en la página 19
Applications The supported functions allow a security administrator to configure the RBT‐4102 as follows: •Grant restricted access to an un‐authenticated guest user. •Grant access to an authenticated user with an assigned role. • Support a default role for un‐authenticated users or authenticated users without authorization information. • Control access by IP subnet or address range. • Control access by TCP/UDP port number. •Fifty roles, with a maximum of 50 rules per role. Bilateral rules count
Resumen del contenido incluido en la página 20
Applications 1-4 Introduction