A SERVICE OF

logo

Index
Index
SYN flood ........................................ 53
104-bit shared key ................................ 15
Winnuke........................................... 53
40-bit shared key .................................. 15
authentication
802.11a specification support............... 11
RADIUS........................................... 15
802.11b specification support............... 11
setting method.................................. 32
802.1x authentication
Cell Controller services.......................... 9
EAP ............................................ 32, 56
checks
Kerberos ..................................... 16, 59
FTP bounce attack............................ 53
RADIUS........................................... 15
IP unaligned timestamp.................... 53
shared key......................................... 16
MIME flood attack........................... 54
access
sequence number prediction............. 53
AirBEAM software .......................... 77
source routing................................... 53
configuring for administrator ........... 75
SYN flood attack.............................. 53
configuring for management ............ 76
Winnuke attack ................................ 53
overview of types ............................. 40
CLI, restoring settings.......................... 69
policies, firewall............................... 13
client configuration examples ............ 110
protocols........................................... 40
configurable firewall filters.................. 53
rules and exceptions ......................... 40
configuration
access control
access ports ...................................... 37
example use cases..................... 90, 115
administrator access ......................... 75
lists ............................................. 37, 72
advanced........................................... 43
mobile units...................................... 37
CLI ................................................... 69
access ports
connecting to outside ....................... 26
adopting............................................ 30
DHCP......................................... 24, 25
advanced settings.............................. 47
example use cases ............................ 88
associated mobile units..................... 79
Gateway firewall.............................. 52
associating to WLANs ................... 104
Gateway NAT settings ..................... 50
configuring ....................................... 37
LAN interface .................................. 21
default settings.................................. 44
management access .......................... 76
example use cases... 100, 125, 130, 136
overview........................................... 21
general information .......................... 78
restoring defaults.............................. 68
managing ............................................ 7
RIP ................................................... 55
overview........................................... 12
sample file...................................... 137
POS ................................................ 101
SNMP traps................................ 70, 72
printer ............................................. 102
subnet access.................................... 39
statistics ............................................ 77
subnets.............................................. 23
administration
system............................................... 66
changing password ........................... 77
WAN interface ................................. 26
configuring access............................ 75
wireless LANs.................................. 28
firewall ............................................. 13
WLAN security................................ 31
overview........................................... 61
WLANs ............................................ 30
remote............................................... 70
connections, testing............................ 110
adoption, access ports........................... 30
conventions, typographical .................... 6
AirBEAM
country, changing................................. 63
example use cases........................... 115
defaults, restoring................................. 68
setting up access............................... 77
DHCP
always on firewall filters...................... 52
advanced settings ............................. 25
attacks
client and server ............................... 14
FTP bounce ...................................... 53
configuration .................................... 24
MIME flood...................................... 54
Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved 147
WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004