
8| Contents Dell PowerConnect W-Series Instant Access Point 6.1.3.4-3.1.0.0 | User Guide
Intrusion Detection System .................................................................................................. 190
Wireless Intrusion Detection System (WIDS) Event Reporting to Dell PowerConnect W-
AirWave ...................................................................................................................................190
RF Visualization Support for Dell Instant............................................................................191
Configuring Dell PowerConnect W-AirWave ............................................................................191
Creating your Organization String ....................................................................................... 191
About Shared Key...................................................................................................................192
Entering the Organization String and AMP Information into the IAP ....................192
Dell PowerConnect W-AirWave Discovery through DHCP Option................................192
Standard DHCP option 60 and 43 on Windows Server 2008 ...................................192
Alternate method for defining Vendor Specific DHCP options.......................................195
Chapter 24 Monitoring ........................................................................................................................ 199
Virtual Controller View...................................................................................................................199
Monitoring Link .......................................................................................................................200
Info ............................................................................................................................................200
RF Dashboard..........................................................................................................................200
Usage Trends ..........................................................................................................................200
Client Alerts Link.....................................................................................................................202
IDS Link ....................................................................................................................................202
Network View..................................................................................................................................202
Info ............................................................................................................................................203
Usage Trends ..........................................................................................................................203
Instant Access Point View............................................................................................................ 204
Info ............................................................................................................................................205
RF Dashboard..........................................................................................................................205
Overview ..................................................................................................................................205
Client View.......................................................................................................................................212
Info ............................................................................................................................................213
RF Dashboard..........................................................................................................................213
RF Trends .................................................................................................................................213
Mobility Trail............................................................................................................................ 216
Chapter 25 Alert Types and Management....................................................................................... 217
Alert Types.......................................................................................................................................217
Chapter 26 Policy Enforcement Firewall.......................................................................................... 219
Authentication Servers..................................................................................................................219
Users for Internal Server...............................................................................................................220
Roles .................................................................................................................................................220
Extended Voice and Video Functionalities.........................................................................221
QoS for Microsoft Office OCS and Apple Facetime..................................................221
Client Blacklisting...........................................................................................................................223
Types of Client Blacklisting...........................................................................................................224
Manual Blacklisting ...............................................................................................................224
Adding a Client to the Manual Blacklist .....................................................................224
Dynamic Blacklisting .............................................................................................................225
Authentication Failure Blacklisting .............................................................................225
Session Firewall Based Blacklisting...........................................................................225
PEF Settings.....................................................................................................................................225
Firewall ALG Configuration ................................................................................................... 225
Firewall-based Logging ......................................................................................................... 226
Chapter 27 VPN Configuration........................................................................................................... 227