Contents
Cloning the address of a wired device.....................................................................
3-30
Limitations .....................................................................................................
Enabling Ethernet MAC cloning ........................................................................
3-31
Wireless access to the M111 when MAC cloning is active .............................
Setting up management traffic interception..............................................
3-32
Using filters to restrict wireless traffic....................................................................
3-33
Assigning a management address ............................................................................
3-34
To assign a management address ......................................................................
SNMP ...........................................................................................................................
3-35
Attributes .......................................................................................................
3-36
v1/v2c communities ......................................................................................
v3 users ..........................................................................................................
Notification receivers...................................................................................
3-37
Security ..........................................................................................................
Managing certificates.................................................................................................
802.1X certificates ...............................................................................................
3-38
802.1X — Install TLS client certificate.......................................................
802.1X — Manage TLS client certificates ..................................................
3-39
802.1X — Trusted CA certificates...............................................................
802.1X — Manage CA certificates...............................................................
Certificate stores .................................................................................................
Trusted CA certificate store ........................................................................
3-40
Certificate and private key store.................................................................
3-41
Certificate usage ..................................................................................................
3-42
Changing the certificate assigned to a service..........................................
3-43
About certificate warnings ..........................................................................
Configuration file management................................................................................
3-44
Manual configuration file management ............................................................
Backup configuration...................................................................................
Reset configuration ......................................................................................
3-45
Restore configuration...................................................................................
Scheduled operations..........................................................................................
Software updates........................................................................................................
3-46
Performing an immediate software update......................................................
3-47
Performing a scheduled update.........................................................................
vi