A SERVICE OF

logo

Index
setting up communication ................ 18
dimensions, physical .............................. 8
interfaces, subnets ................................ 82
downloads, firmware............................ 65
IP unaligned timestamp check ............. 53
EAP authentication
Kerberos authentication
configuring ....................................... 56
802.1x............................................... 16
WLANs ............................................ 32
configuring....................................... 59
encryption method
WLANs ............................................ 33
KeyGuard-MCM .............................. 36
KeyGuard-MCM
none.................................................. 36
configuring....................................... 36
setting ............................................... 33
overview........................................... 17
WEP ................................................. 33
LAN interface
WPA-TKIP....................................... 34
configuration .................................... 21
environmental specifications.................. 9
defining subnets ............................... 22
example use cases
example use cases .......................... 117
field office ...................................... 111
Layer 3 routing
retail.................................................. 86
overview........................................... 14
firewall
RIP ................................................... 14
access policies .................................. 13
LED functions...................................... 61
administration................................... 13
limited access....................................... 40
always on filters ............................... 52
location, changing ................................ 63
configurable filters ........................... 53
management
configuration .................................... 52
changing password........................... 77
DHCP client and server.................... 14
configuring access............................ 76
example use cases................... 100, 125
MIME flood attack check .................... 54
features ............................................. 13
mobile units
FTP bounce attack check.................. 53
ACL.................................................. 37
IP unaligned timestamp check.......... 53
associations ...................................... 79
MIME flood attack check................. 54
name, changing for switch ................... 62
overview........................................... 13
NAT
security ............................................... 7
configuration .................................... 50
sequence number prediction check... 53
example use cases .................... 98, 123
source routing check......................... 53
overview........................................... 13
stateful inspection engine................. 13
Network Address Translation ....See NAT
SYN flood attack.............................. 53
no access .............................................. 40
Winnuke attack check ...................... 53
NTP servers, specifying ....................... 60
firmware
operating system services....................... 9
downloads......................................... 65
overview, system.................................... 7
updating...................................... 64, 65
passwords, changing ...................... 20, 77
FTP
physical specifications ........................... 8
bounce attack check ......................... 53
Point-to-Point over Ethernet (PPPoE).. 27
sending settings to site...................... 67
ports, access ....................See access ports
using for firmware updates............... 65
POS access port, example use cases .. 101
full access ............................................. 40
POS subnet, example use case ............. 92
Gateway
power specifications............................... 9
configuring static routes................... 54
printer access port, example use cases 102
firewall configuration....................... 52
protocols, access................................... 40
NAT configuration ........................... 50
RADIUS authentication, 802.1x .......... 15
NAT services.................................... 13
received tables...................................... 79
overview of services......................... 10
remote administration .......................... 70
hardware, overview ................................ 8
resetting switch .................................... 64
installation
retail use cases...................................... 86
changing password ........................... 20
RIP
overview........................................... 18
Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved 148
WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004