Figure 352: Global Configuration; Table 329: General Global Configurations - D-Link DWS-4026 User Manual

Dws-4000 series unified wired & wireless access system
Table of Contents

Advertisement

Software User Manual
12/10/09
Table 329
describes the fields on the Wireless Global Configuration page.
Field
Peer Group ID
Client Roam Timeout
Ad Hoc Client Status
Timeout
AP Failure Status
Timeout
MAC Authentication
Mode
RF Scan Status
Timeout
Document
34CSFP6XXUWS-SWUM100-D7

Figure 352: Global Configuration

Table 329: General Global Configurations

Description
In order to support larger networks, you can configure wireless switches as peers, with up to
64 switches in a cluster (peer group). Peer switches share some information about APs and
allow L3 roaming among them.
Peers are grouped according to the Group ID.
This value determines how long to keep an entry in the Associated Client Status list after a
client has disassociated. Each entry in the status list shows an age, and when the age reaches
the value you configure in the timeout field, the entry is deleted.
This value determines how long to keep an entry in the Ad Hoc Client Status list. Each entry
in the status list shows an age, and when the age reaches the value you configure in the
timeout field, the entry is deleted.
This value determines how long to keep an entry in the AP Authentication Failure Status list.
Each entry in the status list shows an age, and when the age reaches the value you configure
in the timeout field, the entry is deleted.
Select the global action to take on wireless clients in the
• white-list: Select this option to specify that any wireless clients with MAC addresses that are
specified in the Known Client database, and are not explicitly denied access, are granted
access. If the MAC address is not in the database then the access to the client is denied.
• black-list: Select this option to specify that any wireless clients with MAC addresses that are
specified in the Known Client database, and are not explicitly granted access, are denied
access. If the MAC address is not in the database then the access to the client is granted.
MAC Authentication is enabled at the network level. The network configuration also defines
whether MAC addresses are looked up on the local database or on the RADIUS server.
This value determines how long to keep an entry in the RF Scan Status list. Each entry in the
status list shows an age, and when the age reaches the value you configure in the timeout
field, the entry is deleted.
D-Link Unified Access System
Configuring Advanced Settings
Page 507

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8600apDws-4000 series

Table of Contents