Enterasys Networks 802.11 User Manual

Page 195

Advertising
background image

Index-3

Index

console port

Access Point security 2-19
configuring for security 5-28
connecting a device B-1
description 4-5
infrastructure network 5-7
password 5-28
point-to-multipoint network 5-17
point-to-point network 5-12
security 5-28
tips for using B-3
used with VLAN 5-42

console port (R2)

connecting a device B-1
infrastructure network 5-6
point-to-multipoint network 5-16
point-to-point network 5-7, 5-11
security 2-19
tips for using B-3

console port password (Access Point)

description 2-19

console port password (RoamAbout R2)

description 2-19

counters

AP 2000 7-12–7-13
AP Classic 7-12–7-13
overview 7-11
PC Card 7-14–7-16
RADIUS 6-11
RoamAbout R2 7-17–7-18

Coverage area

definition 1-6
determining 3-2
overlap 3-5
size by transmit speed 3-3, 3-7, 3-8
using Site Monitor 6-5

CSMA/CA protocol 2-9

D
data corruption 6-15
Data Link layer 1-2

Data throughput efficiency

description 2-8

DECnet End Node Hello filter 5-45
DECnet filter 5-45
Delivery Traffic Indication Message

See DTIM

Deny Non-Encrypted Data 5-25, 7-16
DHCP

description 5-19
modifying with console port 5-21
modifying with R2 console port 5-20

Diagnose Card 6-9
Directional antenna 1-18, 6-7
Discover 4-4
Distances

ad-hoc network 3-8
infrastructure network 3-3
LAN-to-LAN 3-7

DTIM

description 2-11
modifying 5-22

Dynamic address learning 1-3
Dynamic VLAN 2-25

E
Encryption

ASCII to HEX conversion C-1
configuring 5-25
counter 7-13, 7-16
description 2-13

Endpoint AP

description 1-10

Endpoint Bridge mode

See Point-to-Point

Error logs 7-18
Ethernet Speed 5-6, 5-11, 5-16
Extensible Authentication Protocol (EAP) 2-15

Advertising