HP ProCurve 520wl Wireless Access Point User Manual

Page 191

Advertising
background image

system names ... 2-1, 4-3
system requirements ... 2-2
system status ... 4-31
table names ... C-11
tables

See also

parameters

adding entries to ... C-9, C-35
changing elements in ... C-10, C-11
creating ... C-11
deleting elements in ... C-10, C-11
displaying all elements in ... C-10
displaying parameters in ... C-8, C-11
inserting rows ... C-9
overview ... C-11, C-24
searching for parameters in ... C-7

telnet command ... C-12
terminal emulation programs ... 7-9, C-12
testing

connections ... 5-7
image downloads ... 6-3

text strings ... C-12
text-based configurations ... C-8
thresholds ... 4-33
throughput ... 4-16, 4-49
timed reboots ... C-7
topologyChange trap ... 4-30
transmission rates ... 1-4, 1-7, A-7
transmit power levels ... 4-8, C-15
transmitter ... 1-8
transmitting data packets ... 4-10, 4-12, 4-24, 4-49
traps ... 4-28–4-30, 4-41
troubleshooting ... 4-31, 7-1
unauthenticated client PCs ... 4-35
unauthorized communications ... 4-33
unauthorized users ... 2-10, 4-34
unavailable channels ... A-4, A-6
unexpected performance issues ... C-20
updating HP ProCurve Wireless AP 520wl ... 2-13, 6-4,

6-5

upgrades ... 2-2, 4-3
upload (defined) ... C-1
upload command ... C-8, C-35
uploading

SSL certificates ... 4-19
certificate/private key pairs ... C-20
configuration files ... 2-13, 6-7, 6-8, C-8
private keys ... 4-19

user authentication

See

authentication

verifying IP addresses ... 7-10
version information ... 5-2, 6-7

viewing

CLI commands ... 6-1, C-4
CLI parameters ... C-4, C-5, C-8, C-11
HTTP configuration information ... C-20
IP addresses ... C-11
MAC addresses ... 5-4
on-line help ... 6-12, 7-3
operating statistics ... 5-1, C-24
station statistics ... 5-9
system information ... 3-1, C-13
version information ... 5-2, 6-7

virtual LAN

See

VLAN

warranty ... 1-ii
wireless LANs (WLANs) ... 4-34

See also

networks

wireless access point units

See

HP ProCurve Wireless

wireless alarms ... 4-28
wireless backbone setup ... 4-16
wireless clients

assigning IP addresses to ... 4-5, 4-6
assigning management access to ... 4-50
assigning network names to ... 2-1
blocking ... 4-24, 4-25
configuring DNS ... C-17
controlling access for ... 4-27
enabling subscriber blocking for ... C-40
getting information about ... 5-9
limiting communications for ... 4-33
operational modes for ... 4-8
redirecting traffic for ... 4-33
setting encryption keys for ... C-15
setting host groups for ... 4-47
testing connection strength for ... 5-7
tracking session lengths for ... 4-46

wireless interface

changing settings for ... C-18
configuring ... 2-10, 4-7
disabled ... 4-6
enabling TX Power Control for ... C-15
getting information about ... 5-4, 5-6
operational modes for ... 2-12
setting encryption for ... C-15
setting network names for ... C-14
setting security modes for ... 4-36
setting up virtual LANs for ... 4-48

wireless interface configuration parameters ... C-30–

C-32

wireless interface security parameters ... C-41
wireless signal ... A-7
workgroups ... 4-49, 7-4
’ (single quote) characters ... C-12

10-Index

Advertising