In MeshConnex systems, a mesh point (MP) is a virtual mesh networking instance on a device, similar to a WLAN AP. On each device, up to 4 MPs can be created and 2 can be created per radio. MPs can be configured to use one or both radios in the device. If the MP is configured to use both radios, the path selection protocols will continually select the best radio to reach each destination. Each MP participates in a single Mesh Network, defined by the MeshID, that is typically a descriptive network name, similar to the SSID of a WLAN. All MPs configured to use the same MeshID attempt to form a mesh and interoperate. The MeshID allows overlapping mesh networks to discriminate and disregard MPs belonging to different networks.
To configure a mesh point policy:
Assign a policy name and select Add.
Mesh ID | The IDs (mesh identifiers) assigned to mesh points |
Mesh Point Status | The status of each configured mesh point, either Enabled or Disabled |
Mesh QoS Policy | The mesh Quality of Service (QoS) policy associated with each configured mesh point |
Beacon Format | Specify the format in which beacons from the mesh point are sent. To use access point style beacons, select access-point from the drop-down list box. To use mesh point style beacons, select mesh-point. The default value is mesh-point. |
Is Root | Select to define the mesh point as a root in the mesh topology |
Control VLAN | The VLAN (virtual interface ID) for the control VLAN on each of the configured mesh points |
Allowed VLANs | The list of VLANs allowed on each configured mesh point |
Neighbor Inactivity Timeout | Specify the amount of time allowed between frames received from a neighbor before their client privileges are revoked. Specify the timeout value between 1 to 86,400 seconds |
Description | Descriptive text provided by the administrator for each configured mesh point. Type a 64-character description for the mesh point configuration |
Security Mode |
Select a security authentication mode for the mesh point. Select None to have no authentication for the mesh point. Select EAP to use a secured credential exchange, dynamic keying and strong encryption. If selecting EAP, refer to the EAP PEAP Authentication field at the bottom of the screen and define the credentials of an EAP user and trustpoint. Select PSK to set a pre-shared key as the authentication for the mesh-point. If PSK is selected, enter a pre-shared key in the Key Settings field |
Pre-Shared Key | When the security mode is set as PSK, type a 64 character HEX or an 8-63 ASCII character passphrase used for authentication on the mesh point. |
Unicast Rotation Interval | Define an interval for unicast key transmission between 30 to 86,400 seconds |
Broadcast Rotation Interval | When activated, the key indices used for encrypting or decrypting broadcast traffic is alternatively rotated based on the defined interval. Define an interval for broadcast key transmission in seconds, between 30 to 86,400. Key rotation enhances the broadcast traffic security on the WLAN |
User ID | Create a 32-character maximum user name for a peap-mschapv2 authentication credential exchange |
Password | Define a 32-character maximum password for the EAP PEAP user ID |
Trust Point | Provide the 64 character maximum name of the trustpoint used for installing the CA certificate and validating the server certificate |
EAP TLS | Provide the 64 character maximum name of the trustpoint used for installing the client certificate, client private key and CA certificate |
Type | Configure the EAP authentication method used by the supplicant. The default EAP type is HEX |
EAP Identity | Type the 32-character maximum identity string used during phase 1 authentication. This string does not need to represent the identity of the user, rather an anonymous identity string |
AAA Policy | Select an existing AAA Policy from the drop-down list box to apply to this user‘s mesh point EAP configuration. Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to the network, enforcing user authorization policies, and auditing and tracking usage. These combined processes are central for securing wireless client resources and wireless network data flows |
2.4 GHz Mesh Point | Click Select to configure radio rates for the 2.4
GHz band. Define both minimum Basic and optimal Supported rates as required for the 802.11b
rates, 802.11g rates and 802.11n rates supported by the 2.4
GHz band. These are the rates wireless client traffic is
supported within this mesh point. If you are supporting 802.11n, select a Supported MCS index. Set an MCS (modulation and coding scheme) in respect to the radio‘s channel width and guard interval. An MCS defines (based on RF channel conditions) an optimal combination of eight data rates, bonded channels, multiple spatial streams, different guard intervals, and modulation types. Mesh points can communicate as long as they support the same basic MCS (as well as non-11n basic rates). The selected rates apply to associated client traffic within this mesh point only |
5.0 GHz Mesh Point | Click Select to configure radio rates for the 5.0
GHz band. Define both minimum Basic and optimal Supported rates as required for the 802.11b
rates, 802.11g rates and 802.11n rates supported by the 5.0
GHz radio band. These are
the rates wireless client traffic is supported within
this mesh point. If you are supporting 802.11n, select a Supported MCS index. Set an MCS (modulation and coding scheme) in respect to the radio‘s channel width and guard interval. An MCS defines (based on RF channel conditions) an optimal combination of eight data rates, bonded channels, multiple spatial streams, different guard intervals, and modulation types. Mesh points can communicate as long as they support the same basic MCS (as well as non-11n basic rates). The selected rates apply to associated client traffic within this mesh point only |