EasyManua.ls Logo

Motorola WiNG 5.5 - Page 7

Motorola WiNG 5.5
954 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents iii
5.2.6.4 IGMP Snooping .......................................................................................................................................5-70
5.2.6.5 Quality of Service (QoS) ..........................................................................................................................5-72
5.2.6.6 Spanning Tree Configuration ..................................................................................................................5-74
5.2.6.7 Routing ....................................................................................................................................................5-77
5.2.6.8 Dynamic Routing (OSPF) ..........................................................................................................................5-79
5.2.6.9 Forwarding Database ..............................................................................................................................5-86
5.2.6.10 Bridge VLAN ..........................................................................................................................................5-88
5.2.6.11 Cisco Discovery Protocol Configuration ................................................................................................5-93
5.2.6.12 Link Layer Discovery Protocol Configuration ........................................................................................5-94
5.2.6.13 Miscellaneous Network Configuration .................................................................................................5-95
5.2.6.14 Alias ......................................................................................................................................................5-96
5.2.6.15 Profile Network Configuration and Deployment Considerations .......................................................5-104
5.2.7 Profile Security Configuration .........................................................................................................................5-105
5.2.7.1 Defining Profile VPN Settings ...............................................................................................................5-106
5.2.7.2 Auto IPSec Tunnel .................................................................................................................................5-122
5.2.7.3 Defining Profile Security Settings .........................................................................................................5-123
5.2.7.4 Setting the Certificate Revocation List (CRL) Configuration .................................................................5-124
5.2.7.5 Setting the Profile’s NAT Configuration ...............................................................................................5-125
5.2.7.6 Setting the Profile’s Bridge NAT Configuration ....................................................................................5-134
5.2.7.7 Profile Security Configuration and Deployment Considerations ..........................................................5-136
5.2.8 Virtual Router Redundancy Protocol (VRRP) Configuration ............................................................................5-137
5.2.9 Profile Critical Resources ................................................................................................................................5-141
5.2.10 Profile Services Configuration ......................................................................................................................5-144
5.2.10.1 Profile Services Configuration and Deployment Considerations ........................................................5-145
5.2.11 Profile Management Configuration ..............................................................................................................5-146
5.2.11.1 Upgrading AP6532 Firmware from 5.1 ................................................................................................5-151
5.2.11.2 Profile Management Configuration and Deployment Considerations ................................................5-151
5.2.12 Mesh Point Configuration .............................................................................................................................5-152
5.2.12.1 Vehicle Mounted Modem (VMM) Deployment Consideration ...........................................................5-159
5.2.13 Advanced Profile Configuration ....................................................................................................................5-160
5.2.13.1 Advanced Profile Client Load Balancing .............................................................................................5-161
5.2.13.2 Configuring MINT Protocol .................................................................................................................5-165
5.2.13.3 Advanced Profile Miscellaneous Configuration .................................................................................5-170
5.2.14 Environmental Sensor Configuration ............................................................................................................5-171
5.3 Managing Virtual Controllers ...................................................................................................................................5-174
5.4 Overriding a Device Configuration ...........................................................................................................................5-176
5.4.1 Basic Configuration .........................................................................................................................................5-176
5.4.2 Certificate Management .................................................................................................................................5-178
5.4.2.1 Manage Certificates .............................................................................................................................5-180
5.4.3 RF Domain Overrides ......................................................................................................................................5-193
5.4.4 Wired 802.1X Overrides ..................................................................................................................................5-195
5.4.5 Device Overrides .............................................................................................................................................5-196
5.4.5.1 Radio Power Overrides ..........................................................................................................................5-198
5.4.5.2 Adoption Overrides ...............................................................................................................................5-200
5.4.5.3 Profile Interface Override Configuration ...............................................................................................5-203
5.4.5.4 Overriding the Network Configuration ..................................................................................................5-237
5.4.5.5 Overriding a Security Configuration ......................................................................................................5-282

Table of Contents

Related product manuals