Table of Contents 3
5.2.6.3 L2TPv3 Profile Configuration ...................................................................................................................5-70
5.2.6.4 IGMP Snooping .......................................................................................................................................5-80
5.2.6.5 MLD Snooping .........................................................................................................................................5-82
5.2.6.6 Quality of Service (QoS) ..........................................................................................................................5-84
5.2.6.7 Spanning Tree Configuration ..................................................................................................................5-86
5.2.6.8 Routing ....................................................................................................................................................5-89
5.2.6.9 Dynamic Routing (OSPF) ..........................................................................................................................5-92
5.2.6.10 Forwarding Database ..........................................................................................................................5-107
5.2.6.11 Bridge VLAN ........................................................................................................................................5-109
5.2.6.12 Cisco Discovery Protocol Configuration ..............................................................................................5-118
5.2.6.13 Link Layer Discovery Protocol Configuration ......................................................................................5-119
5.2.6.14 Miscellaneous Network Configuration ...............................................................................................5-120
5.2.6.15 Alias ....................................................................................................................................................5-121
5.2.6.16 Profile Network Configuration and Deployment Considerations .......................................................5-129
5.2.7 Profile Security Configuration .........................................................................................................................5-130
5.2.7.1 Defining Profile VPN Settings ...............................................................................................................5-131
5.2.7.2 Auto IPSec Tunnel .................................................................................................................................5-147
5.2.7.3 Defining Profile Security Settings .........................................................................................................5-148
5.2.7.4 Setting the Certificate Revocation List (CRL) Configuration .................................................................5-149
5.2.7.5 Setting the Profile’s NAT Configuration ...............................................................................................5-150
5.2.7.6 Setting the Profile’s Bridge NAT Configuration ....................................................................................5-158
5.2.7.7 Profile Security Configuration and Deployment Considerations ..........................................................5-160
5.2.8 Virtual Router Redundancy Protocol (VRRP) Configuration ............................................................................5-161
5.2.9 Profile Critical Resources ................................................................................................................................5-165
5.2.10 Profile Services Configuration ......................................................................................................................5-168
5.2.10.1 Profile Services Configuration and Deployment Considerations ........................................................5-169
5.2.11 Profile Management Configuration ..............................................................................................................5-170
5.2.11.1 Upgrading AP6532 Firmware from 5.1 ................................................................................................5-174
5.2.11.2 Profile Management Configuration and Deployment Considerations ................................................5-175
5.2.12 Mesh Point Configuration .............................................................................................................................5-175
5.2.12.1 Vehicle Mounted Modem (VMM) Deployment Consideration ...........................................................5-183
5.2.13 Advanced Profile Configuration ....................................................................................................................5-184
5.2.13.1 Advanced Profile Client Load Balancing .............................................................................................5-184
5.2.13.2 Configuring MINT Protocol .................................................................................................................5-189
5.2.13.3 Advanced Profile Miscellaneous Configuration .................................................................................5-194
5.2.14 Environmental Sensor Configuration ............................................................................................................5-195
5.3 Managing Virtual Controllers ...................................................................................................................................5-198
5.4 Overriding a Device Configuration ...........................................................................................................................5-200
5.4.1 Basic Configuration .........................................................................................................................................5-200
5.4.2 Certificate Management .................................................................................................................................5-202
5.4.2.1 Manage Certificates .............................................................................................................................5-204
5.4.3 RF Domain Overrides ......................................................................................................................................5-217
5.4.4 Wired 802.1X Overrides ..................................................................................................................................5-219
5.4.5 Device Overrides .............................................................................................................................................5-220
5.4.5.1 Radio Power Overrides ..........................................................................................................................5-223
5.4.5.2 Adoption Overrides ...............................................................................................................................5-225
5.4.5.3 Profile Interface Override Configuration ...............................................................................
................5-228