Symbol Technologies WS 2000 User Manual

Page 148

Advertising
background image

Index

setting up communication ................ 18

dimensions, physical .............................. 8

interfaces, subnets ................................ 82

downloads, firmware ............................ 65

IP unaligned timestamp check ............. 53

EAP authentication

Kerberos authentication

configuring ....................................... 56

802.1x............................................... 16

WLANs ............................................ 32

configuring ....................................... 59

encryption method

WLANs ............................................ 33

KeyGuard-MCM .............................. 36

KeyGuard-MCM

none .................................................. 36

configuring ....................................... 36

setting ............................................... 33

overview........................................... 17

WEP ................................................. 33

LAN interface

WPA-TKIP....................................... 34

configuration .................................... 21

environmental specifications.................. 9

defining subnets ............................... 22

example use cases

example use cases .......................... 117

field office ...................................... 111

Layer 3 routing

retail.................................................. 86

overview........................................... 14

firewall

RIP ................................................... 14

access policies .................................. 13

LED functions ...................................... 61

administration................................... 13

limited access ....................................... 40

always on filters ............................... 52

location, changing ................................ 63

configurable filters ........................... 53

management

configuration .................................... 52

changing password ........................... 77

DHCP client and server.................... 14

configuring access............................ 76

example use cases................... 100, 125

MIME flood attack check .................... 54

features ............................................. 13

mobile units

FTP bounce attack check.................. 53

ACL.................................................. 37

IP unaligned timestamp check.......... 53

associations ...................................... 79

MIME flood attack check................. 54

name, changing for switch ................... 62

overview ........................................... 13

NAT

security ............................................... 7

configuration .................................... 50

sequence number prediction check... 53

example use cases .................... 98, 123

source routing check......................... 53

overview........................................... 13

stateful inspection engine ................. 13

Network Address Translation ....See NAT

SYN flood attack .............................. 53

no access .............................................. 40

Winnuke attack check ...................... 53

NTP servers, specifying ....................... 60

firmware

operating system services....................... 9

downloads......................................... 65

overview, system.................................... 7

updating...................................... 64, 65

passwords, changing ...................... 20, 77

FTP

physical specifications ........................... 8

bounce attack check ......................... 53

Point-to-Point over Ethernet (PPPoE).. 27

sending settings to site...................... 67

ports, access ....................See access ports

using for firmware updates............... 65

POS access port, example use cases .. 101

full access ............................................. 40

POS subnet, example use case ............. 92

Gateway

power specifications............................... 9

configuring static routes ................... 54

printer access port, example use cases 102

firewall configuration ....................... 52

protocols, access................................... 40

NAT configuration ........................... 50

RADIUS authentication, 802.1x .......... 15

NAT services.................................... 13

received tables...................................... 79

overview of services......................... 10

remote administration .......................... 70

hardware, overview ................................ 8

resetting switch .................................... 64

installation

retail use cases...................................... 86

changing password ........................... 20

RIP

overview ........................................... 18

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

148

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

Advertising