Contents

Cloning the address of a wired device.....................................................................

3-30

Limitations .....................................................................................................

3-30

Enabling Ethernet MAC cloning ........................................................................

3-31

Wireless access to the M111 when MAC cloning is active .............................

3-31

Setting up management traffic interception..............................................

3-32

Using filters to restrict wireless traffic....................................................................

3-33

Assigning a management address ............................................................................

3-34

To assign a management address ......................................................................

3-34

SNMP ...........................................................................................................................

3-35

Attributes .......................................................................................................

3-36

v1/v2c communities ......................................................................................

3-36

v3 users ..........................................................................................................

3-36

Notification receivers...................................................................................

3-37

Security ..........................................................................................................

3-37

Managing certificates.................................................................................................

3-37

802.1X certificates ...............................................................................................

3-38

802.1X — Install TLS client certificate.......................................................

3-38

802.1X — Manage TLS client certificates ..................................................

3-39

802.1X — Trusted CA certificates...............................................................

3-39

802.1X — Manage CA certificates...............................................................

3-39

Certificate stores .................................................................................................

3-39

Trusted CA certificate store ........................................................................

3-40

Certificate and private key store.................................................................

3-41

Certificate usage ..................................................................................................

3-42

Changing the certificate assigned to a service..........................................

3-43

About certificate warnings ..........................................................................

3-43

Configuration file management................................................................................

3-44

Manual configuration file management ............................................................

3-44

Backup configuration...................................................................................

3-44

Reset configuration ......................................................................................

3-45

Restore configuration...................................................................................

3-45

Scheduled operations..........................................................................................

3-45

Software updates........................................................................................................

3-46

Performing an immediate software update......................................................

3-47

Performing a scheduled update.........................................................................

3-47

vi