Symbol Technologies WS 2000 User Manual

Page 149

Advertising
background image

Index

technical ............................................. 8

defining routes.................................. 55

stateful inspection engine..................... 13

setting configuration......................... 55

static routes

support.............................................. 14

configuring ....................................... 54

routes, defining..................................... 55
Routing information Protocol.......See RIP

defining ............................................ 55

statistics

rules, access .......................................... 40

access ports ...................................... 77

security

subnets.............................................. 80

802.1x EAP authentication............... 56

WAN ................................................ 82

802.1x Kerberos authentication........ 59

subnets

example use cases........................... 128

configuring ....................................... 23

firewalls .............................................. 7

configuring access............................ 39

specifying NTP servers .................... 60

defining ............................................ 22

WLANs ............................................ 31

example use cases ............ 91, 108, 135

sequence number prediction check....... 53

interfaces .......................................... 82

servers, specifying NTP ....................... 60

POS example.................................... 92

services

statistics ............................................ 80

Cell Controller.................................... 9

switch

Gateway............................................ 10

changing location or country............ 63

operating system................................. 9

changing name ................................. 62

settings

resetting ............................................ 64

advanced........................................... 43

settings ............................................. 61

advanced access port ........................ 47

SYN flood attack.................................. 53

default access port ............................ 44

system administration overview........... 61

example use cases..................... 88, 113

system log

exporting........................................... 66

setting up log server ......................... 85

exporting to file ................................ 67

viewing on switch ............................ 84

exporting to FTP site ........................ 67

working with .................................... 84

importing .......................................... 66

system overview..................................... 7

importing to file................................ 67

tables, received and transmitted ........... 79

importing to FTP site........................ 67

technical specifications .......................... 8

restoring defaults .............................. 68

transmitted tables ................................. 79

switch ............................................... 61

traps

shared keys

categories ......................................... 73

104-bit .............................................. 15

configuring ....................................... 72

40-bit ................................................ 15

SNMP v1/v2..................................... 74

authentication ................................... 16

SNMP v3.......................................... 75

SNMP

typographical conventions ..................... 6

access control lists ............................ 72

WAN interface

management support ........................ 14

configuring ....................................... 26

trap configuration ....................... 70, 72

example use cases .................... 97, 121

v1/v2 community definitions............ 70

statistics ............................................ 82

v1/v2 traps ........................................ 74

WEP

v3 community definitions................. 71

configuring ....................................... 33

v3 traps ............................................. 75

WEP 128 (104-bit key) .................... 15

version configuration........................ 70

WEP 64 (40-bit key) ........................ 15

software

WPA................................................. 17

operating system................................. 9

Wired Equivalency Privacy........See WEP

overview ............................................. 9

Wireless LAN ...................... See WLANs

source routing check............................. 53

Wireless Protected Access (WPA)....... 17

specifications

wireless summary area ......................... 29

hardware ............................................. 8

WLANs

software .............................................. 9

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

149

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

Advertising