Index, Index 147 – Symbol Technologies WS 2000 User Manual

Page 147

Advertising
background image

Index

Index

SYN flood ........................................ 53

104-bit shared key ................................ 15

Winnuke ........................................... 53

40-bit shared key .................................. 15

authentication

802.11a specification support............... 11

RADIUS........................................... 15

802.11b specification support............... 11

setting method .................................. 32

802.1x authentication

Cell Controller services.......................... 9

EAP ............................................ 32, 56

checks

Kerberos ..................................... 16, 59

FTP bounce attack............................ 53

RADIUS ........................................... 15

IP unaligned timestamp.................... 53

shared key......................................... 16

MIME flood attack........................... 54

access

sequence number prediction............. 53

AirBEAM software .......................... 77

source routing................................... 53

configuring for administrator ........... 75

SYN flood attack.............................. 53

configuring for management ............ 76

Winnuke attack ................................ 53

overview of types ............................. 40

CLI, restoring settings.......................... 69

policies, firewall ............................... 13

client configuration examples ............ 110

protocols ........................................... 40

configurable firewall filters.................. 53

rules and exceptions ......................... 40

configuration

access control

access ports ...................................... 37

example use cases..................... 90, 115

administrator access ......................... 75

lists ............................................. 37, 72

advanced........................................... 43

mobile units ...................................... 37

CLI ................................................... 69

access ports

connecting to outside ....................... 26

adopting............................................ 30

DHCP ......................................... 24, 25

advanced settings.............................. 47

example use cases ............................ 88

associated mobile units..................... 79

Gateway firewall .............................. 52

associating to WLANs ................... 104

Gateway NAT settings ..................... 50

configuring ....................................... 37

LAN interface .................................. 21

default settings.................................. 44

management access .......................... 76

example use cases... 100, 125, 130, 136

overview........................................... 21

general information .......................... 78

restoring defaults.............................. 68

managing ............................................ 7

RIP ................................................... 55

overview ........................................... 12

sample file ...................................... 137

POS ................................................ 101

SNMP traps ................................ 70, 72

printer ............................................. 102

subnet access .................................... 39

statistics ............................................ 77

subnets.............................................. 23

administration

system............................................... 66

changing password ........................... 77

WAN interface ................................. 26

configuring access ............................ 75

wireless LANs.................................. 28

firewall ............................................. 13

WLAN security ................................ 31

overview ........................................... 61

WLANs ............................................ 30

remote............................................... 70

connections, testing ............................ 110

adoption, access ports........................... 30

conventions, typographical .................... 6

AirBEAM

country, changing................................. 63

example use cases........................... 115

defaults, restoring................................. 68

setting up access ............................... 77

DHCP

always on firewall filters ...................... 52

advanced settings ............................. 25

attacks

client and server ............................... 14

FTP bounce ...................................... 53

configuration .................................... 24

MIME flood...................................... 54

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

147

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

Advertising