HP ProCurve 520wl Wireless Access Point User Manual

Page 187

Advertising
background image

autochannel select (ACS) ... C-18, C-30
auto-duplex setting ... 4-16
automatic configurations ... 4-214-23, C-16
automatic key distribution ... 4-34
background scanning ... 4-41, C-23
backing up configurations ... C-16
backing up files ... 2-13
back-up servers ... 2-1, 4-43, 4-45
bandwidth ... 4-11, 4-26, 4-33, 4-49
blank space characters (strings) ... C-12
blocking access to services ... 4-27
bridge ... 4-32, 5-4
bridge parameters ... C-39
browsers

See

Web browsers

build numbers ... 5-2
calculating distance between APs ... C-19
cautions (documentation) ... 1-ii
cell capacities ... 4-11
certificate files ... 6-4, 6-5
certificates ... 1-2, 4-19, C-20
changing

IP addresses ... 7-10, C-9, C-10
TCP/UDP port filters ... 4-27
encryption keys ... 4-37, 4-38
interface settings ... C-18
network adapters ... 2-7
parameters ... C-6, C-8
passwords ... 4-17, C-7, C-13

channel frequencies ... 1-6, A-4A-7
channel restrictions ... 1-6
channel selection ... 4-9
client handovers ... 5-4
clients ... C-17

assigning IP addresses to ... 4-5, 4-6
assigning management access to ... 4-50
assigning network names to ... 2-1
assigning to workgroups ... 4-49
blocking wireless ... 4-24, 4-25
controlling access for ... 4-27
getting information about ... 5-9
limiting communications for ... 4-33
operational modes for ... 4-8
redirecting traffic for ... 4-33
setting encryption keys for ... C-15
setting host groups for ... 4-47
setting up DHCP ... 4-4
setting up DNS ... 4-4
testing connection strength for ... 5-7
tracking session lengths for ... 4-46

closed systems ... 4-9, C-18
coldStart trap ... 4-30
collisions ... 4-10
command list ... C-4
command reference ... C-4–C-11

command statements

adding parameters to ... C-9, C-11
adding strings to ... C-12
entering ... C-1, C-7
moving through ... C-2, C-6
overview ... 1-2

comments ... C-9
communication ports ... C-20
communication requirements ... 2-1
communications information ... 5-4
configuration alarm ... 4-28
configuration files

IP addresses and ... 4-22
backing up ... C-16
defined ... C-1
downloading ... 6-4, 6-5, C-16
uploading ... 2-13, 6-7, 6-8, C-8

configuration interface ... 1-2
configuration parameters ... 4-2, C-13, C-17, C-27
configurations

defining with CLI commands ... C-12, C-13, C-17
overwriting ... 6-11
resetting ... 7-6
saving ... 4-2, 6-9, 6-10, C-9
setting DNS client ... C-17
setting authentication server ... 4-43, 4-44, 4-46, C-22
setting communication port ... C-20
setting management port ... C-19
setting through HTTP/HTTPS ... 4-1
setting up automatic ... 4-21, C-16, C-35
setting wireless interface ... 4-7
troubleshooting ... 7-2, 7-4

connections

configuring Ethernet ... C-19
losing ... 4-6, 6-10, 7-4
maintaining ... C-18
setting properties for ... C-12
testing ... 5-7
troubleshooting ... 7-2, 7-4

conserving bandwidth ... 4-33, 4-49
control-key sequences ... C-2, C-6
conversion rules (system names) ... 4-3
copying help files ... 6-12
corrupted images ... 7-5, 7-6
coverage ... 4-12, 4-41, C-19
coverage area ... 1-7, C-23
creating

filters ... 4-25
parameter tables ... C-11

critical alarms ... 4-30
current IP address ... 4-4
current operating channel ... 4-9
customer assistance ... 5-2
data encryption

See

encryption

data overload ... 4-33
data packets

See

packets

data transmission rates ... 1-4, 1-7, 4-12, A-7

6-Index

Advertising