Chapter 1 Introduction
NWA / WAC Series User’s Guide
21
Figure 4 Repeater Application
When the NWA/WAC is in Repeater mode, repeater security between the NWA/WAC and other
repeater is independent of the security between the wireless clients and the AP or repeater. When
repeater security is enabled, both APs and repeaters must use the same pre-shared key. See Section 7.2
on page 85 and Section 12.2 on page 130 for more details.
Once the security settings of peer sides match one another, the connection between devices is made.
At the time of writing, repeater security is compatible with the NWA/WAC only.
1.2 Ways to Manage the NWA/WAC
You can use the following ways to manage the NWA/WAC.
Web Configurator
The Web Configurator allows easy NWA/WAC setup and management using an Internet browser. This
User’s Guide provides information about the Web Configurator.
Command-Line Interface (CLI)
The CLI allows you to use text-based commands to configure the NWA/WAC. You can access it using
remote management (for example, SSH or Telnet). See the Command Reference Guide for more
information.
File Transfer Protocol (FTP)
This protocol can be used for firmware upgrades and configuration backup and restore.