Streszczenie treści zawartej na stronie nr. 1
®
Enterasys RoamAbout
Wireless Networking
RBT-4102 Wireless Access Point
Configuration Guide
P/N 9034186-05
Streszczenie treści zawartej na stronie nr. 2
Streszczenie treści zawartej na stronie nr. 3
Notice EnterasysNetworks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult EnterasysNetworks to determine whether any such changes have been made. The hardware, firmware, or software described in this document is subject to change without notice. IN NO EVENT SHALL ENTERASYSNETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER
Streszczenie treści zawartej na stronie nr. 4
Enterasys Networks, Inc. Firmware License Agreement BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc., on behalf of itself and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys software program/firmware (including any accompanying documentation, hardware or media) (“Program”)
Streszczenie treści zawartej na stronie nr. 5
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Section 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau, Moldova,
Streszczenie treści zawartej na stronie nr. 6
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement
Streszczenie treści zawartej na stronie nr. 7
Enterasys Networks, Inc. Software License Agreement This document is an agreement (“Agreement”) between You, the end user, and Enterasys Networks, Inc. on behalf of itself and its Affiliates (“Enterasys”) that sets forth your rights and obligations with respect to the software contained in CD‐ROM or other media. “Affiliates” means any person, partnership, corporation, limited liability company, or other form of enterprise that directly or indirectly through one or more intermediaries, control
Streszczenie treści zawartej na stronie nr. 8
to Enterasys. 5. PROTECTION AND SECURITY.In the performance of this Agreement or in contemplation thereof, You and your employees and agents may have access to private or confidential information owned or controlled by Enterasys relating to the Licensed Materials supplied hereunder including, but not limited to, product specifications and schematics, and such information may contain proprietary details and disclosures. All information and data so acquired by You or your employees or agents u
Streszczenie treści zawartej na stronie nr. 9
9. UNITED STATES GOVERNMENT RESTRICTED RIGHTS.The Licensed Materials (i) were developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227‐19 (a) through (d) of the Commercial Computer Software‐Restricted Rights Clause and its successors, and (iii) in all respects is data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Licensed Materials are proprietary considered commer
Streszczenie treści zawartej na stronie nr. 10
viii
Streszczenie treści zawartej na stronie nr. 11
Contents Preface Purpose of This Manual ...................................................................................................................................xiii Intended Audience ...........................................................................................................................................xiii Firmware Version Support ...............................................................................................................................xiii Assoc
Streszczenie treści zawartej na stronie nr. 12
Using Web Management to Configure Authentication ...........................................................................4-16 Using the CLI to Configure Authentication .............................................................................................4-17 Filter Control and VLANs ..............................................................................................................................4-18 Using Web Management to Configure Filter Control and VLANs ................
Streszczenie treści zawartej na stronie nr. 13
Security .........................................................................................................................................................4-78 Wired Equivalent Privacy (WEP) ............................................................................................................4-79 Using Web Management to Configure Security Settings .......................................................................4-79 Using the CLI to Configure WPA Pre-Shared Key ...............
Streszczenie treści zawartej na stronie nr. 14
xii
Streszczenie treści zawartej na stronie nr. 15
Preface Purpose of This Manual This manual provides configuration instructions for the RoamAbout RBT‐4102 Access Point using Web management and the Command Line Interface (CLI). For complete CLI information, refer to the Enterasys RoamAbout RBT‐4102 Wireless Access Point Command Line Interface Reference Guide. Intended Audience This manual is intended for the wireless network manager who will configure the Enterasys RoamAbout 4102 Access Point. You should have a basic knowledge of Local Area
Streszczenie treści zawartej na stronie nr. 16
The following conventions are used in the text of this document: Convention Description Bold font Indicates mandatory keywords, parameters or keyboard keys. italic font Indicates complete document titles, and command parameters. Courier font Used for examples of information displayed on the screen. Courier font in italics Indicates a user-supplied value, either required or optional. [ ] Square brackets indicate an optional value. { } Braces indicate required values. One or more value may be requ
Streszczenie treści zawartej na stronie nr. 17
1 Introduction Overview The RoamAbout RBT‐4102, RBT‐4102‐BG, and RBT‐4102‐EU, are IEEE 802.11a/b/g access points that provide transparent, wireless high‐speed data communications between the wired LAN (WLAN) and fixed or mobile devices equipped with an 802.11a, 802.11b, or 802.11g wireless adapter. This solution offers fast, reliable wireless connectivity with considerable cost savings over wired LANs (which include long‐term maintenance overhead for cabling). Using 802.11a and 802.11g tech
Streszczenie treści zawartej na stronie nr. 18
Features Features The features and benefits of the RBT‐4102 include the following: •Local network connection via 10/100 Mbps Ethernet ports or 54 Mbps wireless interface (supporting up to 255 mobile users per radio). • IEEE 802.11a, 802.11b, and 802.11g compliant. •Rogue AP Detection provides the ability to scan the airwaves and collect information about access points in the area. This feature detects neighboring access points and access points not authorized to participate in the network. •
Streszczenie treści zawartej na stronie nr. 19
Applications The supported functions allow a security administrator to configure the RBT‐4102 as follows: •Grant restricted access to an un‐authenticated guest user. •Grant access to an authenticated user with an assigned role. • Support a default role for un‐authenticated users or authenticated users without authorization information. • Control access by IP subnet or address range. • Control access by TCP/UDP port number. •Fifty roles, with a maximum of 50 rules per role. Bilateral rules count
Streszczenie treści zawartej na stronie nr. 20
Applications 1-4 Introduction