A SERVICE OF

logo

Index
technical ............................................. 8
defining routes.................................. 55
stateful inspection engine..................... 13
setting configuration......................... 55
static routes
support.............................................. 14
configuring....................................... 54
routes, defining..................................... 55
Routing information Protocol.......See RIP
defining ............................................ 55
statistics
rules, access.......................................... 40
access ports ...................................... 77
security
subnets.............................................. 80
802.1x EAP authentication............... 56
WAN ................................................ 82
802.1x Kerberos authentication........ 59
subnets
example use cases........................... 128
configuring....................................... 23
firewalls.............................................. 7
configuring access............................ 39
specifying NTP servers .................... 60
defining ............................................ 22
WLANs ............................................ 31
example use cases ............ 91, 108, 135
sequence number prediction check....... 53
interfaces .......................................... 82
servers, specifying NTP ....................... 60
POS example.................................... 92
services
statistics............................................ 80
Cell Controller.................................... 9
switch
Gateway............................................ 10
changing location or country............ 63
operating system................................. 9
changing name ................................. 62
settings
resetting............................................ 64
advanced........................................... 43
settings ............................................. 61
advanced access port ........................ 47
SYN flood attack.................................. 53
default access port ............................ 44
system administration overview........... 61
example use cases..................... 88, 113
system log
exporting........................................... 66
setting up log server ......................... 85
exporting to file ................................ 67
viewing on switch ............................ 84
exporting to FTP site........................ 67
working with .................................... 84
importing.......................................... 66
system overview..................................... 7
importing to file................................ 67
tables, received and transmitted ........... 79
importing to FTP site........................ 67
technical specifications .......................... 8
restoring defaults.............................. 68
transmitted tables ................................. 79
switch ............................................... 61
traps
shared keys
categories ......................................... 73
104-bit .............................................. 15
configuring....................................... 72
40-bit ................................................ 15
SNMP v1/v2..................................... 74
authentication ................................... 16
SNMP v3.......................................... 75
SNMP
typographical conventions ..................... 6
access control lists............................ 72
WAN interface
management support ........................ 14
configuring....................................... 26
trap configuration ....................... 70, 72
example use cases .................... 97, 121
v1/v2 community definitions............ 70
statistics............................................ 82
v1/v2 traps........................................ 74
WEP
v3 community definitions................. 71
configuring....................................... 33
v3 traps............................................. 75
WEP 128 (104-bit key) .................... 15
version configuration........................ 70
WEP 64 (40-bit key) ........................ 15
software
WPA................................................. 17
operating system................................. 9
Wired Equivalency Privacy........See WEP
overview............................................. 9
Wireless LAN ...................... See WLANs
source routing check............................. 53
Wireless Protected Access (WPA)....... 17
specifications
wireless summary area ......................... 29
hardware............................................. 8
WLANs
software .............................................. 9
Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved 149
WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004