D-Link Unified Wired and Wireless Access SystemOct. 2015 Page 20D-Link UWS User ManualConfiguring Differentiated Services for VoIP.............................................................................................694Configuring a Network with WDS-Managed APs ......................................................................................697Configuring a Network to Use WPA2-Enterprise and Dynamic VLANs.....................................................706Configuring Client Information on the RADIUS Server ........................................................................707Configuring RADIUS Information and AP Profiles on the Switch .........................................................708Verifying the Configuration..................................................................................................................713Optimizing WLAN Traffic ............................................................................................................................715Monitoring and Managing Channel Information .................................................................................715Running and Applying a Manual Channel Plan .............................................................................717Monitoring the RF Transmission Power Level .....................................................................................719Configuring the Automatic Power Adjustment ............................................................................720Load Balancing and WLAN Utilization..................................................................................................723Detecting and Preventing Wireless Intrusion............................................................................................726Configuring a Radio in Sentry Mode ....................................................................................................726Configuring and Monitoring WIDS/WIPS to Detect Rogue APs ...........................................................727Using WIDS/WIPS to Detect Rogue Clients..........................................................................................732Mitigating a Rogue Client Threat .........................................................................................................734Appendix B: Limited Warranty (USA Only)..................................................................... 739Product Registration...................................................................................................................................742Limited Warranty .......................................................................................................................................742What You Must Do For Warranty Service:...........................................................................................744What Is Not Covered............................................................................................................................744Trademarks ..........................................................................................................................................745Copyright Statement............................................................................................................................745FCC Warning.........................................................................................................................................745Appendix C: Technical Support ...................................................................................... 746Appendix D: International Offices ................................................................................. 771Registration CardAll Countries and Regions Excluding USA..............................................................................................773