Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Nortel 2350 manuals

2350 first page preview

2350

Brand: Nortel | Category: Switch
Table of contents
  1. trademark information
  2. service information
  3. known limitations
  4. network topology
  5. distributed aps
  6. vlan configuration
  7. deploying changes
2350 first page preview

2350

Brand: Nortel | Category: Software
Table of contents
2350 first page preview

2350

Brand: Nortel | Category: Software
Table of contents
  1. restricted rights legend
  2. legal information
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Introducing the Nortel WLAN 2300 Series System
  10. Documentation
  11. Safety and Advisory Notices
  12. Getting Started
  13. Hardware Requirements for WMS Services
  14. Preparing for Installation
  15. HP OpenView Network Node Manager
  16. WMS Services Options
  17. Unpacking Files
  18. Start WMS Services
  19. Connect WMS Clients to WMS Services
  20. WLAN Management Software Access Control
  21. WLAN Management Software Interface
  22. Using the Toolbar and Menu Bar
  23. Easy Configuration Using Wizards
  24. Planning and Managing Your Wireless Network with WMS
  25. Network Plan
  26. Auto-RF
  27. Which Planning Method Should I Use
  28. Configuration
  29. Wireless Configuration
  30. AAA Security Configuration
  31. Authorization
  32. Configure Basic WSS Properties
  33. Deployment
  34. Network Status
  35. Fault Management
  36. RF Plan Optimization
  37. Configuring Wireless Services
  38. Configure Employee Access Services
  39. Step Summary
  40. Create a Radio Profile
  41. Configure RADIUS Servers
  42. Create a Service Profile for 802.1X Access
  43. View the Service Profile's Access Rules
  44. Set Up VLANs on WSSs
  45. What's Next
  46. Task Table
  47. Create a User Group and Guest Users
  48. Create a Service Profile for Guest Access with Web Login
  49. Optional: Configure Mobility Profiles
  50. Configure Voice over Wireless IP Service
  51. Create a Radio Profile for Voice
  52. Create a Service Profile for Voice
  53. Create a Service Profile for SVP VoWIP Devices
  54. Create a Service Profile for Avaya VoWIP Devices
  55. Create a Service Profile for Vocera VoWIP Devices
  56. Using Auto-RF
  57. Place the Equipment
  58. Create a Service Profile
  59. Create a Radio Profile and Map the Service Profile to It
  60. Apply a Radio Profile to Each Radio
  61. Using Auto-RF with Modelling
  62. Insert RF Obstacles
  63. Create Your RF Coverage Area
  64. Associate APs to the Coverage Area
  65. Using RF Planning
  66. Prepare the Floor Drawings
  67. Define Site Information
  68. Import a Floor Plan
  69. Set the Scale
  70. Clean Layout
  71. Model RF Obstacles
  72. Import a Site Survey
  73. Add Wiring Closets
  74. Create Coverage Areas
  75. Compute and Place APs
  76. Assign Channel Settings
  77. Calculate Optimal Power
  78. Display Coverage
  79. Generate a Work Order
  80. Install the Equipment
  81. Managing and Monitoring Your Network
  82. Deploy Your Configuration
  83. Perform Basic Administrative Tasks
  84. Distribute System Images
  85. Distributing System Images
  86. Saving Versions of Network Plans
  87. Import and Export Switch Configuration Files
  88. Monitoring Examples
  89. Monitor an Individual User
  90. Find the User
  91. Locate the User
  92. Display User Activity
  93. View User Performance Statistics
  94. Monitor a Group of Users
  95. Managing Alarms
  96. Classify and Organize Faults
  97. Manage Faults
  98. Alarm Summary Details
  99. Intrusion Detection System (IDS) Alarms
  100. Store Faults and Retrieve Fault History
  101. Generate Alarm Reports
  102. Alarm History Report
  103. Security and Client OUI Reports
  104. Configuring Countermeasures
  105. Optimizing a Network Plan
  106. Using RF Measurements from an Ekahau Site Survey
  107. Generating an Ekahau Site Survey Work Order
  108. Importing RF Measurements from the Ekahau Site Survey
  109. Optimizing the RF Coverage Model
  110. Locating and Fixing Coverage Holes
  111. Displaying the RF Coverage Area
  112. Computing and Placing New APs
  113. Index
2350 first page preview

2350

Brand: Nortel | Category: Software
Table of contents
  1. restricted rights legend
  2. legal information
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Introducing the Nortel WLAN 2300 System
  20. Documentation
  21. Text and Syntax Conventions
  22. Installing WLAN Management Software
  23. Monitoring Service
  24. Software Requirements
  25. Installation Task Overview
  26. Using the Installation Wizard
  27. Installation Log File
  28. Upgrading WLAN Management Software
  29. Uninstalling WLAN Management Software on Linux Systems
  30. Interface
  31. Display Panels
  32. Organizer Panel
  33. Alerts Panel
  34. Reviewing and Deploying Switch Configuration Changes
  35. Configuration Wizards
  36. Resizing a Display Panel
  37. Status Counters
  38. Copying, Pasting, and Deleting Objects
  39. Enabling Keyboard Shortcut Mnemonics (Windows XP Only)
  40. Getting Started
  41. Restricting Access to WLAN Management Software
  42. Creating Provision or Monitor Accounts
  43. Working with Network Plans
  44. Managing Network Plans
  45. Saving a Network Plan with a New Name
  46. Closing a Network Plan
  47. Sharing a Network Plan
  48. Defining a Mobility Domain
  49. Traffic Ports Used by WSS Software
  50. Creating a Mobility Domain
  51. Enabling Secure WSS to WSS communications
  52. Changing the Country Code
  53. Applying the Network's Auto-RF Settings to the Network Plan
  54. Configuring AirDefense
  55. Launching the AirDefense Server User Interface
  56. Uploading a WSS into the Network Plan
  57. Creating a Network Domain
  58. Planning the Nortel WLAN 2300 System
  59. RF Planning Overview
  60. Creating or Modifying a Site
  61. Creating or Modifying Buildings in a Site
  62. Creating or Modifying Floors
  63. Importing or Drawing Floor Details
  64. Preparing a Drawing Before Importing It
  65. Useful AutoCAD Operations and Naming-Conventions
  66. Cropping the Paper Space
  67. Adjusting the Scale of a Drawing
  68. Working with Layers
  69. Hiding Layers
  70. Cleaning Up a Drawing
  71. Drawing Floor Objects Manually
  72. Specifying the RF Characteristics of a Floor
  73. Drawing RF Obstacles
  74. Importing RF Obstacle Data from a Site Survey
  75. Site Survey Recommendations
  76. Generating a Site Survey Order
  77. Importing RF Measurements
  78. Applying the RF Measurements to the Floor Plan
  79. Defining Wireless Coverage Areas
  80. Defining a Coverage Area
  81. Drawing a Coverage Area
  82. Specifying the Wireless Technology for a Coverage Area
  83. Specifying Coverage Area Properties
  84. Specifying Floor Properties for the Coverage Area
  85. Specifying Default Device Settings for the Coverage Area
  86. Coverage Area
  87. Configuring Capacity Calculation for Data
  88. Configuring Capacity Calculation for Voice
  89. Wiring Closet Associations
  90. Editing Coverage Areas
  91. Placing Third-Party Access Points
  92. Moving a Third-Party AP Icon to its Floor Location
  93. Placing Installed and Auto-Configured APs
  94. Computing and Placing APs for a Coverage Area
  95. Locking and Unlocking Coverage Areas
  96. Assigning AP Channels
  97. Computing Optimal Power
  98. Verifying the Wireless Network
  99. Placing RF Measurement Points
  100. Using RF Interactive Measurement Mode
  101. Generating RF Network Design Information
  102. Configuring WSS System Parameters
  103. WSS Configuration Objects
  104. Adding a WSS to the Network Plan
  105. Wizard
  106. Adding a Switch by Uploading its Configuration from the Network
  107. Configuring Basic and Advanced Settings
  108. Using the Create WLAN—Security Switch Wizard
  109. Setting Up a Switch
  110. Modifying Basic Switch Parameters
  111. Changing the WSS Software Version
  112. Changing Time zone Properties
  113. Converting Auto DAPs into Statically Configured DAPs
  114. Deleting Auto DAPs
  115. Launching a Web View Management Session with the Switch
  116. Enabling Link Notifications
  117. Configuring a Port for a Directly Connected AP
  118. Configure a Port for Wired Authentication
  119. Viewing and Changing Port Groups
  120. Changing a Port Group
  121. Configuring SNMP
  122. Configuring an SNMP V1 or V2c Community String
  123. Configuring a Notification Profile
  124. Target
  125. Viewing and Setting Log and Trace Settings
  126. Viewing Log Settings
  127. Creating an External Log Server
  128. Viewing and Configuring IP Services Settings
  129. Create an IP Alias
  130. Configuring DNS
  131. Configuring ARP
  132. users and vlans
  133. Viewing VLANs
  134. Changing VLAN Membership
  135. Changing VLAN Spanning Tree Settings
  136. Changing STP Port Settings in a VLAN
  137. Enabling STP Fast Convergence Features
  138. Changing VLAN IGMP Settings
  139. Configuring Static Multicast Ports
  140. Restricting Layer 2 Traffic Among Clients in a VLAN
  141. Restricting Layer 3 Traffic Among Clients in a VLAN
  142. Configuring the WSS Software DHCP Server
  143. Changing the Aging Time for FDB Entries
  144. Creating an ACL
  145. Configuring Advanced ACL Settings
  146. Adding a New ACE to a Configured ACL
  147. Mapping an ACL
  148. Deleting an ACL
  149. Viewing and Changing CoS Mappings
  150. Changing a CoS-to-DSCP Mapping
  151. Configuring Wireless Parameters
  152. Service Profiles
  153. Access Rules
  154. Viewing Wireless Services
  155. Configuring a Voice over Wireless Service
  156. Configuring a Web-Portal (Web-based AAA) Service
  157. Configuring an Open Access Service
  158. Configuring a Mesh Services Profile
  159. Configuring a Custom Service
  160. Service Profile Tab
  161. Authorization Attributes Tab
  162. Voice Configuration Tab
  163. SODA Tab
  164. Modifying SSID Encryption Settings and Access Rules
  165. Modifying Encryption Settings
  166. Modifying Access Rules
  167. Viewing and Configuring Radio Profiles
  168. Moving Radios Back to the Default Radio Profile
  169. Attributes Tab
  170. Auto Tune Tab
  171. Radio Selection Tab
  172. Viewing Auto-DAP Profile Settings
  173. Viewing and Configuring APs
  174. Creating a Distributed AP
  175. Configuring a Directly Connected AP
  176. Setting Up AP Redundancy
  177. Changing the AP Model
  178. Changing the AP-WSS Security Mode
  179. AP-2330B and Series 2332 APs
  180. Viewing and Changing Radio Settings
  181. Changing Radio Settings
  182. Adding an Entry to the Permitted Vendor OUI List
  183. Adding an Entry to the Rogue List
  184. Enabling AP Signatures
  185. Accounting Parameters
  186. Viewing Users and Groups in the Local Database
  187. Creating a User Group and Assigning Users To It
  188. Creating a MAC User
  189. Authorization Attributes
  190. Viewing and Configuring RADIUS Settings
  191. Viewing RADIUS Settings, Servers, and Server Groups
  192. Creating a RADIUS Server Group
  193. Changing Default RADIUS Settings
  194. Configuring RADIUS System Accounting
  195. Viewing and Configuring Global 802.1X Settings
  196. Viewing and Configuring 802.1X Network Access Rules
  197. Viewing and Configuring MAC Network Access Rules
  198. Viewing and Configuring Web-based AAA Network Access Rules
  199. Viewing and Configuring WSS Administrator Access Rules
  200. Creating an Access Rule for Telnet or SSH Access
  201. Viewing and Configuring AAA Support for Third-Party AP Users
  202. Viewing Settings for Third-Party AP AAA Support
  203. Configuring a RADIUS Proxy for a Client
  204. Specifying the WSS Port Connected to the Third-Party AP
  205. Creating a Location Policy Rule
  206. Viewing and Changing Mobility Profiles
  207. Configuring WSSs Remotely
  208. Staged WSS
  209. WLAN Management Software Requirements
  210. Example 1: Deployment Site has DHCP and Local DNS
  211. Example 3: Deployment Site has DNS but no DHCP
  212. Domain differs from Corporate DNS Domain
  213. Preconfiguring a switch in WLAN Management Software
  214. Configuration with WLAN Management Software
  215. Replacing a switch and reusing its configuration
  216. Enabling Replacement of Remote Switches
  217. Managing WSS System Images and Configurations
  218. Devices Tab
  219. Toolbar Options
  220. Synchronizing Local and Network Changes
  221. Accepting Network Changes
  222. Software have Nonmatching Changes
  223. Distributing System Images
  224. Rebooting WSSs or APs
  225. Software
  226. Canceling a Scheduled Operation
  227. to import a configuration
  228. Modifying Configuration Change Polling Options
  229. Verifying Configuration Changes
  230. Filtering the Message List
  231. Disabling a Rule from the Message List
  232. Disabling and Reenabling Rules
  233. Managing Certificates
  234. Processing Certificates
  235. Reviewing Certificate Details
  236. Configuring and Applying Policies
  237. Creating a Policy
  238. Applying Policy Changes to Switches
  239. Managing Alarms
  240. Classifying and Organizing Alarms
  241. Search Capabilities
  242. Fault States
  243. Managing Faults
  244. Alarm Summary
  245. Top 5 Sources of Alarms
  246. Intrusion Detection System (IDS) Alarms
  247. Denial of Service (DoS) Alarms
  248. Reporting Faults
  249. Alarm History Report
  250. Using the Event Log
  251. Refreshing Event Data
  252. Filtering Events by Severity
  253. Creating and Saving Filters
  254. Generating Reports
  255. Scheduling and E-mailing Reports
  256. Configuration Requirements
  257. Generating an Inventory Report
  258. Generating a Mobility Domain Configuration Report
  259. Generating a WSS Configuration Report
  260. Generating a Client Summary Report
  261. Generating a Client Details Report
  262. Generating a Client Errors Report
  263. Generating a Network Usage Report (Port Traffic)
  264. Generating a Network Usage Report (Radio Traffic)
  265. Generating an RF Summary Report
  266. Generating a Radio Details Report
  267. Generating a Rogue Details Report
  268. Generating an Alarm Summary
  269. Generating an Alarm History
  270. Generating a Security Alarm Report
  271. Generating a Work Order
  272. Monitoring the Network
  273. Network Types
  274. Using the Monitor View
  275. Status Summary
  276. Client Summary
  277. Status Monitor or Status Summary Details
  278. Using the Alarm Summary View
  279. Alarm Summary Details
  280. Additional Alarm Options
  281. Using the Client Summary View
  282. Client Details
  283. Additional Client Options
  284. Finding a Client
  285. Locating the User
  286. Refreshing Client Data
  287. Performing an RF Link Test
  288. Using the Traffic Summary View
  289. Traffic Details
  290. Voice Monitoring with Traffic Views
  291. Using the floor view monitor
  292. On-Demand Statistics Monitoring
  293. Detecting and Combatting Rogue Devices
  294. Mobility Domain Requirement
  295. Displaying Rogue Information
  296. Displaying Rogue Details
  297. Displaying Rogue Client Information
  298. Filtering the Rogue List
  299. Current, Current Hour, Current Day, and History Tabs
  300. Listeners Tab
  301. Displaying a Rogue's Geographical Location
  302. Ignoring Friendly Third-Party Devices
  303. Adding a Device to the Rogue List
  304. Adding a Rogue's Clients to the Black List
  305. Configuring RF Detection Options from the Organizer Panel
  306. Optimizing a Network Plan
  307. Locating and Fixing Coverage Holes
  308. Fixing a Coverage Hole
  309. Changing WLAN Management Software Preferences
  310. Changing User Interface Options
  311. Changing Persistence Options
  312. Changing Certificate Management Options
  313. Changing Colors
  314. Changing WLAN Management Software Logging Options
  315. Preferences
  316. Starting or Stopping WMS Services
  317. on Windows Systems
  318. on Linix Systems
  319. Connecting to WMS Services
  320. Certificate Check
  321. Receiving Service Data
  322. Changing Service Settings
  323. Changing WSS Connection Settings
  324. Changing Monitoring Settings
  325. to change monitoring settings
  326. Accessing WMS Services Log
  327. Backing Up a Plan
  328. Restoring a Plan from a Backup
  329. Deleting a Plan Backup
  330. Index
2350 first page preview

2350

Brand: Nortel | Category: Switch
Table of contents
  1. configuration guide
  2. restricted rights legend
  3. legal information
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. Table Of Contents
  13. Table Of Contents
  14. Table Of Contents
  15. Table Of Contents
  16. Table Of Contents
  17. Table Of Contents
  18. Table Of Contents
  19. Table Of Contents
  20. Table Of Contents
  21. Table Of Contents
  22. Table Of Contents
  23. Table Of Contents
  24. Table Of Contents
  25. Table Of Contents
  26. Table Of Contents
  27. Table Of Contents
  28. Table Of Contents
  29. Table Of Contents
  30. Table Of Contents
  31. Introducing the Nortel WLAN 2300 system
  32. Documentation
  33. Safety and advisory notices
  34. Using the command-line interface
  35. Command prompts
  36. Syntax notation
  37. Text entry conventions and allowed characters
  38. User wildcards, MAC address wildcards, and VLAN wildcards
  39. VLAN wildcards
  40. Port lists
  41. Virtual LAN identification
  42. Command-line editing
  43. Single-asterisk (*) wildcard character
  44. Understanding command descriptions
  45. WSS setup methods
  46. Overview
  47. Web View
  48. How a WSS gets its configuration
  49. Web Quick Start (2350 and 2360/2361)
  50. Accessing the Web Quick Start
  51. CLI quickstart command
  52. Quickstart example
  53. Remote WSS configuration
  54. Opening the QuickStart network plan in WLAN Management Software
  55. access
  56. Before you start
  57. Types of Administrative Access
  58. Setting the WSS enable password
  59. WMS enable password
  60. Authenticating at the console
  61. Customizing Web-based AAA with "wildcards" and groups
  62. Setting user passwords
  63. Displaying the Web-based AAA configuration
  64. Saving the configuration
  65. Local authentication
  66. Local override and backup local authentication
  67. Authentication when RADIUS servers do not respond
  68. Managing User Passwords
  69. Setting passwords for local users
  70. Setting the maximum number of login attempts
  71. Configuring password expiration time
  72. Displaying Password Information
  73. Setting the port type
  74. Setting a port for a directly connected AP
  75. Configuring for a AP
  76. Clearing a port
  77. Clearing a AP
  78. Removing a port name
  79. Configuring port operating parameters
  80. Gigabit Ports—autonegotiation and flow control
  81. Resetting a port
  82. Displaying PoE state
  83. Monitoring port statistics
  84. Configuring load-sharing port groups
  85. Removing a port group
  86. Interoperating with Cisco Systems EtherChannel
  87. VLANs, IP subnets, and IP addressing
  88. Traffic forwarding
  89. Configuring a VLAN
  90. Removing an entire VLAN or a VLAN port
  91. Changing tunneling affinity
  92. Displaying VLAN information
  93. Managing the layer 2 forwarding database
  94. Displaying forwarding database entries
  95. Adding an entry to the forwarding database
  96. Changing the aging timeout period
  97. Configuring and managing IP interfaces and services
  98. MTU support
  99. Configuring and managing IP interfaces
  100. Disabling or reenabling an IP interface
  101. Configuring the system IP address
  102. Displaying IP routes
  103. Adding a static route
  104. Removing a static route
  105. Managing the management services
  106. Adding an SSH user
  107. Managing SSH server sessions
  108. Adding a Telnet user
  109. Managing Telnet server sessions
  110. Displaying HTTPS information
  111. Configuring and managing DNS
  112. Adding the default domain name
  113. Adding an alias
  114. Configuring and managing time parameters
  115. Displaying the time zone
  116. Displaying the summertime period
  117. Displaying the time and date
  118. Removing an NTP server
  119. Managing the ARP table
  120. Changing the aging timeout
  121. Logging in to a remote device
  122. Tracing a route
  123. IP interfaces and services configuration scenario
  124. Configuring SNMP
  125. Setting the system location and contact strings
  126. Enabling SNMP versions
  127. Configuring community strings (SNMPv1 and SNMPv2c only)
  128. Creating a USM user for SNMPv3
  129. Command examples
  130. Setting SNMP security
  131. Configuring a notification profile
  132. Configuring a notification target
  133. Enabling the SNMP service
  134. Displaying notification targets
  135. Configuring and managing Mobility Domain roaming
  136. Configuring a Mobility Domain
  137. Configuring a member
  138. Displaying Mobility Domain status
  139. Displaying the Mobility Domain configuration
  140. Monitoring the VLANs and tunnels in a Mobility Domain
  141. Displaying roaming VLANs and their affinities
  142. Requirements for roaming to succeed
  143. Mobility Domain scenario
  144. Configuring network domains
  145. Network domain seed affinity
  146. Configuring a network domain
  147. Configuring network domain seeds
  148. Specifying network domain seed peers
  149. Configuring network domain members
  150. Displaying network domain information
  151. Clearing network domain configuration from a WSS
  152. Clearing a network domain seed from a WSS
  153. Clearing a network domain peer from a network domain seed
  154. Network domain scenario
  155. Configuring RF load balancing for APs
  156. Disabling or re-enabling RF load balancing
  157. Setting strictness for RF load balancing
  158. Configuring APs
  159. Country of operation
  160. Distributed AP network requirements
  161. Distributed APs and DHCP option 43
  162. AP parameters
  163. Boot process for distributed APs
  164. Establishing connectivity on the network
  165. Loading and activating an operational image
  166. AP boot examples
  167. Session load balancing
  168. Public and private SSIDs
  169. Encryption
  170. Auto-RF
  171. Configuring global AP parameters
  172. Specifying the country of operation
  173. Configuring an auto-AP profile for automatic AP configuration
  174. Configured APs have precedence over unconfigured APs
  175. Configuring an auto-AP profile
  176. Configuring AP port parameters
  177. Setting the port type for a directly connected AP
  178. Configuring an indirectly connected AP
  179. Clearing an AP from the configuration
  180. Changing bias
  181. Enabling LED blink mode
  182. Encryption options
  183. Setting the AP security requirement on a WSS
  184. Creating a service profile
  185. Changing the fallthru authentication type
  186. Enforcing the Data Rates
  187. Disabling idle-client probing
  188. Changing the short retry threshold
  189. Creating a new profile
  190. Resetting a radio profile parameter to its default value
  191. Configuring radio-specific parameters
  192. Configuring the external antenna model
  193. AP-2330B and Series 2332 APs
  194. Antenna selection decision trees
  195. Specifying the external antenna model
  196. Assigning a radio profile and enabling radios
  197. Resetting a radio to its factory default settings
  198. Displaying AP information
  199. Displaying connection information for APs
  200. Displaying active connection information for APs
  201. Displaying radio profile information
  202. Displaying static IP address information for APs
  203. Displaying AP statistics counters
  204. Configuring WLAN mesh services
  205. Configuring the Mesh AP
  206. Configuring the Service Profile for Mesh Services
  207. Configuring Security
  208. Enabling Link Calibration Packets on the Mesh Portal AP
  209. Deploying the Mesh AP
  210. Displaying WLAN Mesh Services Information
  211. Configuring user encryption
  212. Configuring WPA
  213. WPA cipher suites
  214. TKIP countermeasures
  215. WPA authentication methods
  216. WPA information element
  217. Client support
  218. Creating a service profile for WPA
  219. Changing the TKIP countermeasures timer value
  220. Displaying WPA settings
  221. Assigning the service profile to radios and enabling the radios
  222. Configuring RSN (802.11i)
  223. Specifying the RSN cipher suites
  224. Displaying RSN settings
  225. Setting static WEP key values
  226. Assigning static WEP keys
  227. Enabling WPA with TKIP
  228. Enabling dynamic WEP in a WPA network
  229. Configuring encryption for MAC clients
  230. Configuring Auto-RF
  231. How channels are selected
  232. Tuning the transmit data rate
  233. Changing Auto-RF settings
  234. Changing power tuning settings
  235. Locking down tuned settings
  236. Displaying RF neighbors
  237. Displaying RF attributes
  238. Configuring APs to be AeroScout listeners
  239. Locating an RFID tag
  240. Using an AeroScout engine
  241. Using WMS
  242. AirDefense integration with the Nortel WLAN 2300 system
  243. Converting an AP into an AirDefense sensor
  244. Copying the AirDefense sensor software to the WSS
  245. Loading the AirDefense sensor software on the AP
  246. Specifying the AirDefense server
  247. Converting an AirDefense sensor back to an AP
  248. Summary of QoS features
  249. End-to-End QoS
  250. QoS mode
  251. WMM QoS mode
  252. SVP QoS mode
  253. U-APSD support
  254. Broadcast control
  255. Changing the QoS mode
  256. Changing the maximum number of active sessions
  257. Using the client DSCP value to classify QoS level
  258. Displaying a service profile's QoS settings
  259. Displaying CoS mappings
  260. Displaying a CoS-to-DSCP mapping
  261. Configuring and managing spanning tree protocol
  262. Enabling the spanning tree protocol
  263. Changing standard spanning tree parameters
  264. port priority
  265. Changing the bridge priority
  266. Changing STP port parameters
  267. Changing the STP port priority
  268. Changing spanning tree timers
  269. Configuring and managing STP fast convergence features
  270. uplink fast convergence
  271. Configuring port fast convergence
  272. Displaying port fast convergence information
  273. Configuring backbone fast convergence
  274. Displaying the backbone fast convergence state
  275. Configuring uplink fast convergence
  276. Displaying uplink fast convergence information
  277. Displaying STP bridge and port information
  278. Displaying the STP port cost on a VLAN basis
  279. Displaying blocked STP ports
  280. Displaying spanning tree statistics
  281. Clearing STP statistics
  282. Configuring and managing IGMP snooping
  283. Enabling the pseudo-querier
  284. Changing the query interval
  285. Changing the other-querier-present interval
  286. Changing the query response interval
  287. Changing the last member query interval
  288. Changing robustness
  289. Changing the router solicitation interval
  290. Adding or removing a static multicast router port
  291. Adding or removing a static multicast receiver port
  292. Displaying multicast configuration information and statistics
  293. Displaying multicast statistics only
  294. Displaying multicast queriers
  295. Displaying multicast routers
  296. Displaying multicast receivers
  297. Configuring and managing security ACLs
  298. Overview of security ACL commands
  299. Security ACL filters
  300. Order in which ACLs are applied to traffic
  301. Setting a source IP ACL
  302. Wildcard masks
  303. Setting an ICMP ACL
  304. Setting TCP and UDP ACLs
  305. Determining the ACE order
  306. Committing a Security ACL
  307. Viewing security ACL information
  308. Viewing security ACL details
  309. Clearing security ACLs
  310. Mapping user-based security ACLs
  311. distributed APs
  312. Modifying a security ACL
  313. Adding another ACE to a security ACL
  314. Placing one ACE before another
  315. Modifying an existing security ACL
  316. Clearing security ACLs from the edit buffer
  317. Using ACLs to change CoS
  318. Filtering based on DSCP values
  319. Enabling prioritization for legacy voice over IP
  320. General guidelines
  321. Enabling VoIP support for TeleSym VoIP
  322. Enabling SVP optimization for SpectraLink phones
  323. Configuring a service profile for WPA
  324. Configuring a VLAN and AAA for voice clients
  325. Disabling Auto-RF before upgrading a SpectraLink phone
  326. Restricting client-to-client forwarding among IP-only clients
  327. Security ACL configuration scenario
  328. Managing keys and certificates
  329. Wireless security through TLS
  330. PEAP-MS-CHAP-V2 security
  331. Public key infrastructures
  332. Public and private keys
  333. Digital certificates
  334. PKCS #7, PKCS #10, and PKCS #12 object files
  335. Creating keys and certificates
  336. your network
  337. Creating public-private key pairs
  338. Generating self-signed certificates
  339. Installing a key pair and certificate from a PKCS #12 object file
  340. object file
  341. Installing a CA's own certificate
  342. Key and certificate configuration scenarios
  343. Creating self-signed certificates
  344. Installing CA-signed certificates from PKCS #12 object files
  345. CSR) and a PKCS #7 object file
  346. SSID name "Any
  347. User credential requirements
  348. Configuring AAA for network users
  349. Authentication
  350. Authentication algorithm
  351. Last-resort processing
  352. Accounting
  353. Summary of AAA features
  354. Wildcards" and groups for network user classification
  355. AAA methods for IEEE 802.1X and Web network access
  356. Remote authentication with local backup
  357. IEEE 802.1X Extensible Authentication Protocol types
  358. Effects of authentication type on encryption method
  359. Configuring 802.1X Acceleration
  360. Using pass-through
  361. Authenticating through a local database
  362. Binding user authentication to machine authentication
  363. Bonded Authentication period
  364. Bonded Authentication configuration example
  365. Configuring authentication and authorization by MAC address
  366. Adding and clearing MAC users and user groups locally
  367. Configuring MAC authentication and authorization
  368. Changing the MAC authorization password for RADIUS
  369. How Web portal Web-based AAA works
  370. Web-based AAA requirements and recommendations
  371. Network requirements
  372. Configuring Web portal Web-based AAA
  373. Web-based AAA users
  374. Using a custom login
  375. Copying and modifying the Web login
  376. Using dynamic fields in Web-based AAA redirect URLs
  377. Using an ACL other than portalacl
  378. Configuring the Web portal Web-based AAA session timeout period
  379. Configuring the Web Portal Web-based AAA Logout Function
  380. Configuring last-resort access for wired authentication ports
  381. Authentication process for users of a third-party AP
  382. Requirements
  383. with tagged SSIDs
  384. Configuring access for any users of a non-tagged SSID
  385. Assigning attributes to users and groups
  386. Assigning SSID default attributes to a service profile
  387. Assigning a security ACL to a user or a group
  388. Assigning a security ACL on a RADIUS server
  389. Assigning encryption types to wireless users
  390. Assigning and clearing encryption types on a RADIUS server
  391. Keeping users on the same VLAN even after roaming
  392. Overriding or adding attributes locally with a location policy
  393. About the location policy
  394. How the location policy differs from a security ACL
  395. Setting the location policy
  396. Displaying and positioning location policy rules
  397. Clearing location policy rules and disabling the location policy
  398. Configuring periodic accounting update records
  399. Enabling system accounting messages
  400. Viewing local accounting records
  401. Viewing roaming accounting records
  402. Displaying the AAA configuration
  403. Avoiding AAA problems in configuration order
  404. Using authentication and accounting rules together
  405. Configuring a Mobility Profile
  406. Network user configuration scenarios
  407. General use of network user commands
  408. Enabling RADIUS pass-through authentication
  409. Enabling PEAP-MS-CHAP-V2 authentication
  410. Enabling PEAP-MS-CHAP-V2 offload
  411. Combining 802.1X Acceleration with pass-through authentication
  412. Overriding AAA-assigned VLANs
  413. Configuring communication with RADIUS
  414. Before you begin
  415. Configuring global RADIUS defaults
  416. Setting the system IP address as the source address
  417. Configuring individual RADIUS servers
  418. Deleting RADIUS servers
  419. Creating server groups
  420. Adding members to a server group
  421. Deleting a server group
  422. Managing 802.1X on the WSS
  423. Enabling and disabling 802.1X globally
  424. Setting 802.1X port control
  425. Enabling 802.1X key transmission
  426. Configuring 802.1X key transmission time intervals
  427. Managing WEP keys
  428. Setting EAP retransmission attempts
  429. Enabling and disabling 802.1X reauthentication
  430. Setting the maximum number of 802.1X reauthentication attempts
  431. Setting the 802.1X reauthentication period
  432. Setting the bonded authentication period
  433. Setting the 802.1X quiet period
  434. Setting the 802.1X timeout for an authorization server
  435. Setting the 802.1X timeout for a client
  436. Viewing 802.1X clients
  437. Viewing the 802.1X configuration
  438. Viewing 802.1X statistics
  439. Configuring SODA endpoint security for a WSS
  440. SODA endpoint security support on WSSs
  441. How SODA functionality works on WSSs
  442. Configuring Web Portal Web-based AAA for the service profile
  443. Creating the SODA agent with SODA manager
  444. Copying the SODA agent to the WSS
  445. Installing the SODA agent files on the WSS
  446. Enabling SODA functionality for the service profile
  447. Disabling enforcement of SODA agent checks
  448. Specifying a SODA agent success
  449. Specifying a SODA agent failure
  450. Specifying a remediation ACL
  451. Specifying a SODA agent logout
  452. Specifying an alternate SODA agent directory for a service profile
  453. Uninstalling the SODA agent files from the WSS
  454. Displaying SODA configuration information
  455. Managing sessions
  456. Displaying and clearing all administrative sessions
  457. Displaying and clearing an administrative console session
  458. Displaying and clearing administrative Telnet sessions
  459. Displaying and clearing client Telnet sessions
  460. Displaying verbose network session information
  461. Displaying and clearing network sessions by username
  462. Displaying and clearing network sessions by MAC address
  463. Displaying and clearing network sessions by VLAN name
  464. Displaying and clearing network sessions by session ID
  465. Displaying and changing network session timers
  466. Disabling keepalive probes
  467. Changing or disabling the user idle timeout
  468. Rogue detection and counter measures
  469. Rogue classification
  470. RF detection scans
  471. Mobility Domain requirement
  472. Configuring rogue detection lists
  473. Configuring a permitted SSID list
  474. Configuring a client black list
  475. Configuring an attack list
  476. Configuring an ignore list
  477. Enabling countermeasures
  478. Using on-demand countermeasures in a Mobility Domain
  479. Disabling or reenabling logging of rogues
  480. DoS attacks
  481. Wireless bridge
  482. IDS log message examples
  483. Displaying RF detection information
  484. Displaying rogue clients
  485. Displaying rogue detection counters
  486. Displaying SSID or BSSID information for a Mobility Domain
  487. Displaying RF detect data
  488. Displaying countermeasures information
  489. Testing the RFPing
  490. Managing system files
  491. Displaying software version information
  492. Displaying boot information
  493. Copying a file
  494. Using an image file's MD5 checksum to verify its integrity
  495. Creating a subdirectory
  496. Removing a subdirectory
  497. Saving configuration changes
  498. Specifying the configuration file to use after the next reboot
  499. Specifying a backup configuration file
  500. Backing up and restoring the system
  501. Managing configuration changes
  502. Upgrading the system image
  503. Upgrading an individual switch using the CLI
  504. Command changes during upgrade
  505. Troubleshooting a WSS
  506. Fixing common WSS setup problems
  507. Recovering the system when the enable password is lost
  508. Configuring and managing the system log
  509. Log message components
  510. Using log commands
  511. Logging to the log buffer
  512. Logging to the console
  513. Setting Telnet session defaults
  514. Saving trace messages in a file
  515. Running traces
  516. Tracing 802.1X sessions
  517. Displaying trace results
  518. Clearing the trace log
  519. Viewing FDB information
  520. Port mirroring
  521. Remotely monitoring traffic
  522. Configuring a snoop filter
  523. Displaying configured snoop filters
  524. Mapping a snoop filter to a radio
  525. Enabling or disabling a snoop filter
  526. Capturing system information and sending it to technical support
  527. The show tech-support command
  528. Debug messages
  529. Sending information to NETS
  530. Enabling and logging onto Web View
  531. Logging onto Web View
  532. Supported RADIUS attributes
  533. Nortel vendor-specific attributes
  534. Traffic ports used by WSS software
  535. DHCP server
  536. How the WSS software DHCP server works
  537. Displaying DHCP server information
  538. Glossary
  539. Index
2350 first page preview

2350

Brand: Nortel | Category: Switch
Table of contents
  1. restricted rights legend
  2. legal information
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Getting Help from the Nortel Web site
  8. Introducing the Nortel WLAN 2300 System
  9. configuration and management
  10. Safety and Advisory Notices
  11. Text and Syntax Conventions
  12. WLAN—Security Switch Overview
  13. WSS Model Numbers
  14. Hardware Features
  15. Switch
  16. Management Features
  17. Power Features
  18. Network Interfaces
  19. Status LEDs
  20. Software Features
  21. Layer 2 Switching Features
  22. IP Services
  23. Authentication, Authorization, and Accounting
  24. Roaming
  25. RF Management
  26. Installing and Connecting a WLAN—Security Switch
  27. Installation Requirements and Recommendations
  28. WLAN Management Software Network Plan
  29. Cable Requirements
  30. ap cable requirement
  31. Installation Hardware and Tools
  32. Equipment Rack Installation
  33. Tabletop Installation
  34. Installing a New Power Supply
  35. Powering On a WSS
  36. Powering On a 2350
  37. Troubleshooting a Serial Management Connection
  38. Connecting to Gigabit Ethernet Devices
  39. WSS Setup Methods
  40. WLAN Management Software
  41. How a WLAN—Security Switch Gets its Configuration
  42. Web Quick Start (2350 and 2360 Only)
  43. Accessing the Web Quick Start
  44. CLI quickstart Command
  45. Quickstart Example
  46. Remote WSS Configuration
  47. How Remote WSS Configuration Works
  48. staged wss
  49. Staging a WSS for Configuration by WLAN Management Software
  50. WLAN Management Software Requirements
  51. Opening the QuickStart Network Plan in WLAN Management Software
  52. Configuring a 2370, 2360, or 2380 Switch for Basic Service
  53. Accessing the CLI
  54. Configuring an Enable Password
  55. Configuring the Time and Date
  56. Configuring IP Connectivity
  57. Configuring a Default Route
  58. Enabling Secure Communication for WLAN Management Software or Web View
  59. Installing a Certificate
  60. email address
  61. Installing a Server Certificate for Network Users
  62. Generating a Self-Signed Certificate for Network Users
  63. Displaying Certificate Information for Network Users
  64. Specifying the Country of Operation
  65. country code
  66. Specifying a System IP Address
  67. Configuring for Authenticating Users
  68. Configuring APs for Wireless Users
  69. distributed ap network requirements
  70. configuring for a distributed ap
  71. configuring a service profile
  72. Configuring Mobility Domain Parameters
  73. Configuring the Seed
  74. VLANs and Users
  75. Configuring Pass-Through Authentication
  76. Configuring EAP Offload with Server Authentication
  77. Displaying and Saving the Configuration
  78. Configuring a 2350 Switch for a Branch Office
  79. Installation Requirements
  80. Requirements for AP Access Points
  81. Requirements for the 2350 Switch
  82. Network Requirements
  83. configuration parameters
  84. Configuring the 2350
  85. Configuration Commands
  86. cli commands
  87. Verifying IP Connectivity
  88. Verifying Wireless Access
  89. Configured Parameters
  90. Appendix A: WSS Technical Specifications
  91. Appendix B: WSS Troubleshooting
  92. Appendix C: Translated Warning Conventions and Warnings
  93. laser warning
  94. earth ground warning
  95. overcurrent warning
  96. Index
Related products
23822150236023612380251Softphone 20502070BCM50CC MIS 5.2
Nortel categories
More Nortel categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine