Siemens C10 Betriebsanweisung Seite 107

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 250
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 106
HWC_VNSConfiguration.fm
A31003-W1010-A100-1-7619, July 2005
HiPath Wireless Controller, Access Points and Convergence Software V3.0: User Guide
105
Virtual Network configuration
A VNS with no authentication
3. To enable re-keying after a time interval, click the Broadcast re-key interval checkbox on
(the default is on). Type in the re-key time interval (the time after which the broadcast
encryption key is changed automatically) in seconds.
If the box is unchecked, the Broadcast encryption key is never changed and the Wireless
AP will always use the same broadcast key for Broadcast/Multicast transmissions. Note
that this reduces the level of security for wireless communications.
4. To save the privacy parameters for the new VNS, click on the Save button.
7.8 A VNS with no authentication
You can choose to set up a VNS that will bypass all authentication mechanisms and run
Controller, Access Points and Convergence Software with no authentication of a wireless
device user.
On such a VNS, however, you can still control network access with filtering rules. See Section
7.5.2, “The non-authenticated filter for Captive Portal”, on page 92 for information on how to set
up filtering rules that allow access only to specified IP addresses and ports.
Set up a VNS with no authentication
1. In the Virtual Network Configuration screen, highlight the VNS name in the left-hand list
and click on the Topology tab.
2. In the Topology screen, select Network Assignment by SSID. Follow the steps described
above for a VNS for Captive Portal. Save the new VNS Topology by clicking on the Save
button.
3. Click on the Authentication tab for this VNS. Click on the Configure Captive Portal
button.
4. In the Configure Captive Portal subscreen, select the No Captive Portal radio button, for
no authentication on this VNS, then click on the Save button.
5. In the Filtering screen, define a Non-Authenticated Filter that will control specific network
access for any wireless device users on this VNS. These rules should be very restrictive.
The final rule should be a "Deny All" rule. The Non-Authenticated Filter for a VNS with no
authentication will not have a Captive Portal page for login.
7.9 A VNS for voice traffic
Voice data traffic on a wireless network
New developments are enabling the integration of internet telephony technology on wireless
networks – Voice over Internet Protocol (VoIP) using 802.11 wireless local area networks
(WLANs).
Seitenansicht 106
1 2 ... 102 103 104 105 106 107 108 109 110 111 112 ... 249 250

Kommentare zu diesen Handbüchern

Keine Kommentare