AT-TQ2403 Management Software User's Guide

35

 

 

Intra-Cluster Security

For purposes of ease-of-use, the clustering component is designed to let new devices join a cluster without strong authentication. However, communications of all data between access points in a cluster is protected against casual eavesdropping using Secure Sockets Layer (typically referred to as SSL). The assumption is that the private wired network to which the devices are connected is secure. Both the cluster configuration file and the user database are transmitted among access points using SSL.

Understanding Access Point Settings

The Access Points tab provides information about all access points in the cluster.

From this page, you can view location descriptions, MAC addresses, IP addresses, enable (activate) or disable (deactivate) clustered access points, and remove access points from the cluster. You can also modify the location description for an access point.

The IP address links provide a way to navigate to configuration settings and data on an access point. Stand-alone access points (those which are not members of the cluster) are not shown on this page.

Figure 12: Access Points Setting Page

The following table describes the access point settings and information display in detail.

FieldDescription

Location

Description of where the access point is physically located.