Ads 468x60px

WiNG How-To Guide Wireless Filters - Configuration

Requirements The following requirements must be met prior to attempting this configuration: One (or more) RF Switches are installed and operational on the network. One (or more) Access Ports configured and adopted by the RF Switch. One (or more) WLAN profiles are configured and assigned to adopted radios. A Windows XP workstation is available with Microsoft Internet Explorer...continue reading

WiNG How-To Guide Wireless Filters - Overview

Wireless filters can be applied to specific WLANs to grant or deny access to MUs based on individual or ranges of MAC addresses. Wireless filters may be applied to one or more WLANs and are used to grant or deny access to MUs during association.Wireless filters can be used for multiple applications including blacklisting malicious devices as well...continue reading

WiNG How-To Guide 3G WAN - Configuration

Requirements: The following requirements must be met prior to attempting this configuration: One RFS4000 or RFS6000 WLAN Switch Controllers are installed and operational on the network. A wireline Internet service is connected to the RFS4000 or RFS6000 WLAN Switch Controller and NAT and Firewall rules applied. A supported Express 3G WAN card is activated and installed in the...continue reading

WiNG How-To Guide 3G WAN

Introduction: 3G or 3rd Generation is a family of standards for mobile telecommunications defined by the International Telecommunication Union which includes GSM, UMTS, CDMA as well as DECT and WiMAX. Compared with 2G or 2.5G, 3G offers simultaneous speech and data services and improved data rates allowing network operators to offer a wider range of advanced services to...continue reading

WiNG How-To Guide 802.11i - Configuration

The following section outlines the configuration steps required to configure 802.11i with 802.1X and pre-shared keys on a RF Switch: 1)  802.11i with 802.1X Authentication [Section 3.1]: 2)  802.11i with Pre-Shared Key Authentication  [Section 3.2]: 3.1  802.11i with 802.1X Authentication: As shown in figure 3.1, five AP300s have been deployed at a site with an RF Switch. In...continue reading

WiNG How-To Guide 802.11i - Overview

The IEEE 802.11i standard ratified in 2004 provides enhanced security for WLANs and supersedes the initial 802.11 security specification Wired Equivalent Privacy (WEP) which was shown to have severe security weaknesses. The 802.11i standard improves WLAN security by implementing Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES) for encryption and data integrity. In addition the 802.11i...continue reading

WiNG How-To Guide Digital Certificates - Configuration

The following section outlines the configuration steps required to add a Digital Certificate issued from a Certification Authority onto a RF Switch: 1)  Generating Certificate Request [Section 3.1]: 2)  Importing Signed Certificates [Section 3.2]: 3)  Assigning Trustpoints [Section 3.3] Generating a Certificate Request: Before a certificate can be installed into a trustpoint on the RF Switch, a certificate...continue reading

WiNG How-To Guide Digital Certificates - Overview

Security in 802.11 systems relies on digital certificates to provide mutual authentication and encryption. Mutual authentication or trust is provided by leveraging Public Key Infrastructure (PKI) which allows all parties in the security exchange to verify and validate digital certificates on each party. Authentication and encryption is provided using standard public key and private key algorithms to protect credentials...continue reading

WiNG How-To Guide Microsoft L2TP/IPSec VPN Client-Configuration

Pre-Requisites: Requirements: The following requirements must be met prior to attempting this configuration: One (or more) RF Switches are installed and operational on the network. One (or more) Access Ports configured and adopted by the RF Switch. One (or more) WLAN profiles are configured and assigned to adopted radios. A Windows XP workstation is available with Microsoft Internet...continue reading