Nortel 2382 manuals
2382
Table of contents
- canadian department of communications radio interference regulations
- en 55024 statement
- national safety statements of compliance
- Table Of Contents
- Introduction
- Precautions
- Preventing electrostatic damage in new cable installations
- Planning a WLAN installation
- Gathering required information
- Quick Start — Physical Installation
- Installing a new power supply
- Powering on a 2382
- Connecting to the network
- Quick Start — Basic Configuration
- WSS sample network configuration
- Creating a scope on the DHCP server
- Accessing the WSS CLI quickstart wizard
- Installing and using WMS
- Configuring WSS using WMS
- creating a service profile
- Test the solution
- caution statements
- lithium battery caution
- radio safety advisories for access points
2382
Table of contents
- restricted rights legend
- legal information
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Introducing the Nortel WLAN 2300 Series System
- Documentation
- Safety and Advisory Notices
- Getting Started
- Hardware Requirements for WMS Services
- Preparing for Installation
- HP OpenView Network Node Manager
- WMS Services Options
- Unpacking Files
- Start WMS Services
- Connect WMS Clients to WMS Services
- WLAN Management Software Access Control
- WLAN Management Software Interface
- Using the Toolbar and Menu Bar
- Easy Configuration Using Wizards
- Planning and Managing Your Wireless Network with WMS
- Network Plan
- Auto-RF
- Which Planning Method Should I Use
- Configuration
- Wireless Configuration
- AAA Security Configuration
- Authorization
- Configure Basic WSS Properties
- Deployment
- Network Status
- Fault Management
- RF Plan Optimization
- Configuring Wireless Services
- Configure Employee Access Services
- Step Summary
- Create a Radio Profile
- Configure RADIUS Servers
- Create a Service Profile for 802.1X Access
- View the Service Profile's Access Rules
- Set Up VLANs on WSSs
- What's Next
- Task Table
- Create a User Group and Guest Users
- Create a Service Profile for Guest Access with Web Login
- Optional: Configure Mobility Profiles
- Configure Voice over Wireless IP Service
- Create a Radio Profile for Voice
- Create a Service Profile for Voice
- Create a Service Profile for SVP VoWIP Devices
- Create a Service Profile for Avaya VoWIP Devices
- Create a Service Profile for Vocera VoWIP Devices
- Using Auto-RF
- Place the Equipment
- Create a Service Profile
- Create a Radio Profile and Map the Service Profile to It
- Apply a Radio Profile to Each Radio
- Using Auto-RF with Modelling
- Insert RF Obstacles
- Create Your RF Coverage Area
- Associate APs to the Coverage Area
- Using RF Planning
- Prepare the Floor Drawings
- Define Site Information
- Import a Floor Plan
- Set the Scale
- Clean Layout
- Model RF Obstacles
- Import a Site Survey
- Add Wiring Closets
- Create Coverage Areas
- Compute and Place APs
- Assign Channel Settings
- Calculate Optimal Power
- Display Coverage
- Generate a Work Order
- Install the Equipment
- Managing and Monitoring Your Network
- Deploy Your Configuration
- Perform Basic Administrative Tasks
- Distribute System Images
- Distributing System Images
- Saving Versions of Network Plans
- Import and Export Switch Configuration Files
- Monitoring Examples
- Monitor an Individual User
- Find the User
- Locate the User
- Display User Activity
- View User Performance Statistics
- Monitor a Group of Users
- Managing Alarms
- Classify and Organize Faults
- Manage Faults
- Alarm Summary Details
- Intrusion Detection System (IDS) Alarms
- Store Faults and Retrieve Fault History
- Generate Alarm Reports
- Alarm History Report
- Security and Client OUI Reports
- Configuring Countermeasures
- Optimizing a Network Plan
- Using RF Measurements from an Ekahau Site Survey
- Generating an Ekahau Site Survey Work Order
- Importing RF Measurements from the Ekahau Site Survey
- Optimizing the RF Coverage Model
- Locating and Fixing Coverage Holes
- Displaying the RF Coverage Area
- Computing and Placing New APs
- Index
2382
Table of contents
- restricted rights legend
- legal information
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Introducing the Nortel WLAN 2300 System
- Documentation
- Text and Syntax Conventions
- Installing WLAN Management Software
- Monitoring Service
- Software Requirements
- Installation Task Overview
- Using the Installation Wizard
- Installation Log File
- Upgrading WLAN Management Software
- Uninstalling WLAN Management Software on Linux Systems
- Interface
- Display Panels
- Organizer Panel
- Alerts Panel
- Reviewing and Deploying Switch Configuration Changes
- Configuration Wizards
- Resizing a Display Panel
- Status Counters
- Copying, Pasting, and Deleting Objects
- Enabling Keyboard Shortcut Mnemonics (Windows XP Only)
- Getting Started
- Restricting Access to WLAN Management Software
- Creating Provision or Monitor Accounts
- Working with Network Plans
- Managing Network Plans
- Saving a Network Plan with a New Name
- Closing a Network Plan
- Sharing a Network Plan
- Defining a Mobility Domain
- Traffic Ports Used by WSS Software
- Creating a Mobility Domain
- Enabling Secure WSS to WSS communications
- Changing the Country Code
- Applying the Network's Auto-RF Settings to the Network Plan
- Configuring AirDefense
- Launching the AirDefense Server User Interface
- Uploading a WSS into the Network Plan
- Creating a Network Domain
- Planning the Nortel WLAN 2300 System
- RF Planning Overview
- Creating or Modifying a Site
- Creating or Modifying Buildings in a Site
- Creating or Modifying Floors
- Importing or Drawing Floor Details
- Preparing a Drawing Before Importing It
- Useful AutoCAD Operations and Naming-Conventions
- Cropping the Paper Space
- Adjusting the Scale of a Drawing
- Working with Layers
- Hiding Layers
- Cleaning Up a Drawing
- Drawing Floor Objects Manually
- Specifying the RF Characteristics of a Floor
- Drawing RF Obstacles
- Importing RF Obstacle Data from a Site Survey
- Site Survey Recommendations
- Generating a Site Survey Order
- Importing RF Measurements
- Applying the RF Measurements to the Floor Plan
- Defining Wireless Coverage Areas
- Defining a Coverage Area
- Drawing a Coverage Area
- Specifying the Wireless Technology for a Coverage Area
- Specifying Coverage Area Properties
- Specifying Floor Properties for the Coverage Area
- Specifying Default Device Settings for the Coverage Area
- Coverage Area
- Configuring Capacity Calculation for Data
- Configuring Capacity Calculation for Voice
- Wiring Closet Associations
- Editing Coverage Areas
- Placing Third-Party Access Points
- Moving a Third-Party AP Icon to its Floor Location
- Placing Installed and Auto-Configured APs
- Computing and Placing APs for a Coverage Area
- Locking and Unlocking Coverage Areas
- Assigning AP Channels
- Computing Optimal Power
- Verifying the Wireless Network
- Placing RF Measurement Points
- Using RF Interactive Measurement Mode
- Generating RF Network Design Information
- Configuring WSS System Parameters
- WSS Configuration Objects
- Adding a WSS to the Network Plan
- Wizard
- Adding a Switch by Uploading its Configuration from the Network
- Configuring Basic and Advanced Settings
- Using the Create WLAN—Security Switch Wizard
- Setting Up a Switch
- Modifying Basic Switch Parameters
- Changing the WSS Software Version
- Changing Time zone Properties
- Converting Auto DAPs into Statically Configured DAPs
- Deleting Auto DAPs
- Launching a Web View Management Session with the Switch
- Enabling Link Notifications
- Configuring a Port for a Directly Connected AP
- Configure a Port for Wired Authentication
- Viewing and Changing Port Groups
- Changing a Port Group
- Configuring SNMP
- Configuring an SNMP V1 or V2c Community String
- Configuring a Notification Profile
- Target
- Viewing and Setting Log and Trace Settings
- Viewing Log Settings
- Creating an External Log Server
- Viewing and Configuring IP Services Settings
- Create an IP Alias
- Configuring DNS
- Configuring ARP
- users and vlans
- Viewing VLANs
- Changing VLAN Membership
- Changing VLAN Spanning Tree Settings
- Changing STP Port Settings in a VLAN
- Enabling STP Fast Convergence Features
- Changing VLAN IGMP Settings
- Configuring Static Multicast Ports
- Restricting Layer 2 Traffic Among Clients in a VLAN
- Restricting Layer 3 Traffic Among Clients in a VLAN
- Configuring the WSS Software DHCP Server
- Changing the Aging Time for FDB Entries
- Creating an ACL
- Configuring Advanced ACL Settings
- Adding a New ACE to a Configured ACL
- Mapping an ACL
- Deleting an ACL
- Viewing and Changing CoS Mappings
- Changing a CoS-to-DSCP Mapping
- Configuring Wireless Parameters
- Service Profiles
- Access Rules
- Viewing Wireless Services
- Configuring a Voice over Wireless Service
- Configuring a Web-Portal (Web-based AAA) Service
- Configuring an Open Access Service
- Configuring a Mesh Services Profile
- Configuring a Custom Service
- Service Profile Tab
- Authorization Attributes Tab
- Voice Configuration Tab
- SODA Tab
- Modifying SSID Encryption Settings and Access Rules
- Modifying Encryption Settings
- Modifying Access Rules
- Viewing and Configuring Radio Profiles
- Moving Radios Back to the Default Radio Profile
- Attributes Tab
- Auto Tune Tab
- Radio Selection Tab
- Viewing Auto-DAP Profile Settings
- Viewing and Configuring APs
- Creating a Distributed AP
- Configuring a Directly Connected AP
- Setting Up AP Redundancy
- Changing the AP Model
- Changing the AP-WSS Security Mode
- AP-2330B and Series 2332 APs
- Viewing and Changing Radio Settings
- Changing Radio Settings
- Adding an Entry to the Permitted Vendor OUI List
- Adding an Entry to the Rogue List
- Enabling AP Signatures
- Accounting Parameters
- Viewing Users and Groups in the Local Database
- Creating a User Group and Assigning Users To It
- Creating a MAC User
- Authorization Attributes
- Viewing and Configuring RADIUS Settings
- Viewing RADIUS Settings, Servers, and Server Groups
- Creating a RADIUS Server Group
- Changing Default RADIUS Settings
- Configuring RADIUS System Accounting
- Viewing and Configuring Global 802.1X Settings
- Viewing and Configuring 802.1X Network Access Rules
- Viewing and Configuring MAC Network Access Rules
- Viewing and Configuring Web-based AAA Network Access Rules
- Viewing and Configuring WSS Administrator Access Rules
- Creating an Access Rule for Telnet or SSH Access
- Viewing and Configuring AAA Support for Third-Party AP Users
- Viewing Settings for Third-Party AP AAA Support
- Configuring a RADIUS Proxy for a Client
- Specifying the WSS Port Connected to the Third-Party AP
- Creating a Location Policy Rule
- Viewing and Changing Mobility Profiles
- Configuring WSSs Remotely
- Staged WSS
- WLAN Management Software Requirements
- Example 1: Deployment Site has DHCP and Local DNS
- Example 3: Deployment Site has DNS but no DHCP
- Domain differs from Corporate DNS Domain
- Preconfiguring a switch in WLAN Management Software
- Configuration with WLAN Management Software
- Replacing a switch and reusing its configuration
- Enabling Replacement of Remote Switches
- Managing WSS System Images and Configurations
- Devices Tab
- Toolbar Options
- Synchronizing Local and Network Changes
- Accepting Network Changes
- Software have Nonmatching Changes
- Distributing System Images
- Rebooting WSSs or APs
- Software
- Canceling a Scheduled Operation
- to import a configuration
- Modifying Configuration Change Polling Options
- Verifying Configuration Changes
- Filtering the Message List
- Disabling a Rule from the Message List
- Disabling and Reenabling Rules
- Managing Certificates
- Processing Certificates
- Reviewing Certificate Details
- Configuring and Applying Policies
- Creating a Policy
- Applying Policy Changes to Switches
- Managing Alarms
- Classifying and Organizing Alarms
- Search Capabilities
- Fault States
- Managing Faults
- Alarm Summary
- Top 5 Sources of Alarms
- Intrusion Detection System (IDS) Alarms
- Denial of Service (DoS) Alarms
- Reporting Faults
- Alarm History Report
- Using the Event Log
- Refreshing Event Data
- Filtering Events by Severity
- Creating and Saving Filters
- Generating Reports
- Scheduling and E-mailing Reports
- Configuration Requirements
- Generating an Inventory Report
- Generating a Mobility Domain Configuration Report
- Generating a WSS Configuration Report
- Generating a Client Summary Report
- Generating a Client Details Report
- Generating a Client Errors Report
- Generating a Network Usage Report (Port Traffic)
- Generating a Network Usage Report (Radio Traffic)
- Generating an RF Summary Report
- Generating a Radio Details Report
- Generating a Rogue Details Report
- Generating an Alarm Summary
- Generating an Alarm History
- Generating a Security Alarm Report
- Generating a Work Order
- Monitoring the Network
- Network Types
- Using the Monitor View
- Status Summary
- Client Summary
- Status Monitor or Status Summary Details
- Using the Alarm Summary View
- Alarm Summary Details
- Additional Alarm Options
- Using the Client Summary View
- Client Details
- Additional Client Options
- Finding a Client
- Locating the User
- Refreshing Client Data
- Performing an RF Link Test
- Using the Traffic Summary View
- Traffic Details
- Voice Monitoring with Traffic Views
- Using the floor view monitor
- On-Demand Statistics Monitoring
- Detecting and Combatting Rogue Devices
- Mobility Domain Requirement
- Displaying Rogue Information
- Displaying Rogue Details
- Displaying Rogue Client Information
- Filtering the Rogue List
- Current, Current Hour, Current Day, and History Tabs
- Listeners Tab
- Displaying a Rogue's Geographical Location
- Ignoring Friendly Third-Party Devices
- Adding a Device to the Rogue List
- Adding a Rogue's Clients to the Black List
- Configuring RF Detection Options from the Organizer Panel
- Optimizing a Network Plan
- Locating and Fixing Coverage Holes
- Fixing a Coverage Hole
- Changing WLAN Management Software Preferences
- Changing User Interface Options
- Changing Persistence Options
- Changing Certificate Management Options
- Changing Colors
- Changing WLAN Management Software Logging Options
- Preferences
- Starting or Stopping WMS Services
- on Windows Systems
- on Linix Systems
- Connecting to WMS Services
- Certificate Check
- Receiving Service Data
- Changing Service Settings
- Changing WSS Connection Settings
- Changing Monitoring Settings
- to change monitoring settings
- Accessing WMS Services Log
- Backing Up a Plan
- Restoring a Plan from a Backup
- Deleting a Plan Backup
- Index
2382
Table of contents
- configuration guide
- restricted rights legend
- legal information
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Introducing the Nortel WLAN 2300 system
- Documentation
- Safety and advisory notices
- Using the command-line interface
- Command prompts
- Syntax notation
- Text entry conventions and allowed characters
- User wildcards, MAC address wildcards, and VLAN wildcards
- VLAN wildcards
- Port lists
- Virtual LAN identification
- Command-line editing
- Single-asterisk (*) wildcard character
- Understanding command descriptions
- WSS setup methods
- Overview
- Web View
- How a WSS gets its configuration
- Web Quick Start (2350 and 2360/2361)
- Accessing the Web Quick Start
- CLI quickstart command
- Quickstart example
- Remote WSS configuration
- Opening the QuickStart network plan in WLAN Management Software
- access
- Before you start
- Types of Administrative Access
- Setting the WSS enable password
- WMS enable password
- Authenticating at the console
- Customizing Web-based AAA with "wildcards" and groups
- Setting user passwords
- Displaying the Web-based AAA configuration
- Saving the configuration
- Local authentication
- Local override and backup local authentication
- Authentication when RADIUS servers do not respond
- Managing User Passwords
- Setting passwords for local users
- Setting the maximum number of login attempts
- Configuring password expiration time
- Displaying Password Information
- Setting the port type
- Setting a port for a directly connected AP
- Configuring for a AP
- Clearing a port
- Clearing a AP
- Removing a port name
- Configuring port operating parameters
- Gigabit Ports—autonegotiation and flow control
- Resetting a port
- Displaying PoE state
- Monitoring port statistics
- Configuring load-sharing port groups
- Removing a port group
- Interoperating with Cisco Systems EtherChannel
- VLANs, IP subnets, and IP addressing
- Traffic forwarding
- Configuring a VLAN
- Removing an entire VLAN or a VLAN port
- Changing tunneling affinity
- Displaying VLAN information
- Managing the layer 2 forwarding database
- Displaying forwarding database entries
- Adding an entry to the forwarding database
- Changing the aging timeout period
- Configuring and managing IP interfaces and services
- MTU support
- Configuring and managing IP interfaces
- Disabling or reenabling an IP interface
- Configuring the system IP address
- Displaying IP routes
- Adding a static route
- Removing a static route
- Managing the management services
- Adding an SSH user
- Managing SSH server sessions
- Adding a Telnet user
- Managing Telnet server sessions
- Displaying HTTPS information
- Configuring and managing DNS
- Adding the default domain name
- Adding an alias
- Configuring and managing time parameters
- Displaying the time zone
- Displaying the summertime period
- Displaying the time and date
- Removing an NTP server
- Managing the ARP table
- Changing the aging timeout
- Logging in to a remote device
- Tracing a route
- IP interfaces and services configuration scenario
- Configuring SNMP
- Setting the system location and contact strings
- Enabling SNMP versions
- Configuring community strings (SNMPv1 and SNMPv2c only)
- Creating a USM user for SNMPv3
- Command examples
- Setting SNMP security
- Configuring a notification profile
- Configuring a notification target
- Enabling the SNMP service
- Displaying notification targets
- Configuring and managing Mobility Domain roaming
- Configuring a Mobility Domain
- Configuring a member
- Displaying Mobility Domain status
- Displaying the Mobility Domain configuration
- Monitoring the VLANs and tunnels in a Mobility Domain
- Displaying roaming VLANs and their affinities
- Requirements for roaming to succeed
- Mobility Domain scenario
- Configuring network domains
- Network domain seed affinity
- Configuring a network domain
- Configuring network domain seeds
- Specifying network domain seed peers
- Configuring network domain members
- Displaying network domain information
- Clearing network domain configuration from a WSS
- Clearing a network domain seed from a WSS
- Clearing a network domain peer from a network domain seed
- Network domain scenario
- Configuring RF load balancing for APs
- Disabling or re-enabling RF load balancing
- Setting strictness for RF load balancing
- Configuring APs
- Country of operation
- Distributed AP network requirements
- Distributed APs and DHCP option 43
- AP parameters
- Boot process for distributed APs
- Establishing connectivity on the network
- Loading and activating an operational image
- AP boot examples
- Session load balancing
- Public and private SSIDs
- Encryption
- Auto-RF
- Configuring global AP parameters
- Specifying the country of operation
- Configuring an auto-AP profile for automatic AP configuration
- Configured APs have precedence over unconfigured APs
- Configuring an auto-AP profile
- Configuring AP port parameters
- Setting the port type for a directly connected AP
- Configuring an indirectly connected AP
- Clearing an AP from the configuration
- Changing bias
- Enabling LED blink mode
- Encryption options
- Setting the AP security requirement on a WSS
- Creating a service profile
- Changing the fallthru authentication type
- Enforcing the Data Rates
- Disabling idle-client probing
- Changing the short retry threshold
- Creating a new profile
- Resetting a radio profile parameter to its default value
- Configuring radio-specific parameters
- Configuring the external antenna model
- AP-2330B and Series 2332 APs
- Antenna selection decision trees
- Specifying the external antenna model
- Assigning a radio profile and enabling radios
- Resetting a radio to its factory default settings
- Displaying AP information
- Displaying connection information for APs
- Displaying active connection information for APs
- Displaying radio profile information
- Displaying static IP address information for APs
- Displaying AP statistics counters
- Configuring WLAN mesh services
- Configuring the Mesh AP
- Configuring the Service Profile for Mesh Services
- Configuring Security
- Enabling Link Calibration Packets on the Mesh Portal AP
- Deploying the Mesh AP
- Displaying WLAN Mesh Services Information
- Configuring user encryption
- Configuring WPA
- WPA cipher suites
- TKIP countermeasures
- WPA authentication methods
- WPA information element
- Client support
- Creating a service profile for WPA
- Changing the TKIP countermeasures timer value
- Displaying WPA settings
- Assigning the service profile to radios and enabling the radios
- Configuring RSN (802.11i)
- Specifying the RSN cipher suites
- Displaying RSN settings
- Setting static WEP key values
- Assigning static WEP keys
- Enabling WPA with TKIP
- Enabling dynamic WEP in a WPA network
- Configuring encryption for MAC clients
- Configuring Auto-RF
- How channels are selected
- Tuning the transmit data rate
- Changing Auto-RF settings
- Changing power tuning settings
- Locking down tuned settings
- Displaying RF neighbors
- Displaying RF attributes
- Configuring APs to be AeroScout listeners
- Locating an RFID tag
- Using an AeroScout engine
- Using WMS
- AirDefense integration with the Nortel WLAN 2300 system
- Converting an AP into an AirDefense sensor
- Copying the AirDefense sensor software to the WSS
- Loading the AirDefense sensor software on the AP
- Specifying the AirDefense server
- Converting an AirDefense sensor back to an AP
- Summary of QoS features
- End-to-End QoS
- QoS mode
- WMM QoS mode
- SVP QoS mode
- U-APSD support
- Broadcast control
- Changing the QoS mode
- Changing the maximum number of active sessions
- Using the client DSCP value to classify QoS level
- Displaying a service profile's QoS settings
- Displaying CoS mappings
- Displaying a CoS-to-DSCP mapping
- Configuring and managing spanning tree protocol
- Enabling the spanning tree protocol
- Changing standard spanning tree parameters
- port priority
- Changing the bridge priority
- Changing STP port parameters
- Changing the STP port priority
- Changing spanning tree timers
- Configuring and managing STP fast convergence features
- uplink fast convergence
- Configuring port fast convergence
- Displaying port fast convergence information
- Configuring backbone fast convergence
- Displaying the backbone fast convergence state
- Configuring uplink fast convergence
- Displaying uplink fast convergence information
- Displaying STP bridge and port information
- Displaying the STP port cost on a VLAN basis
- Displaying blocked STP ports
- Displaying spanning tree statistics
- Clearing STP statistics
- Configuring and managing IGMP snooping
- Enabling the pseudo-querier
- Changing the query interval
- Changing the other-querier-present interval
- Changing the query response interval
- Changing the last member query interval
- Changing robustness
- Changing the router solicitation interval
- Adding or removing a static multicast router port
- Adding or removing a static multicast receiver port
- Displaying multicast configuration information and statistics
- Displaying multicast statistics only
- Displaying multicast queriers
- Displaying multicast routers
- Displaying multicast receivers
- Configuring and managing security ACLs
- Overview of security ACL commands
- Security ACL filters
- Order in which ACLs are applied to traffic
- Setting a source IP ACL
- Wildcard masks
- Setting an ICMP ACL
- Setting TCP and UDP ACLs
- Determining the ACE order
- Committing a Security ACL
- Viewing security ACL information
- Viewing security ACL details
- Clearing security ACLs
- Mapping user-based security ACLs
- distributed APs
- Modifying a security ACL
- Adding another ACE to a security ACL
- Placing one ACE before another
- Modifying an existing security ACL
- Clearing security ACLs from the edit buffer
- Using ACLs to change CoS
- Filtering based on DSCP values
- Enabling prioritization for legacy voice over IP
- General guidelines
- Enabling VoIP support for TeleSym VoIP
- Enabling SVP optimization for SpectraLink phones
- Configuring a service profile for WPA
- Configuring a VLAN and AAA for voice clients
- Disabling Auto-RF before upgrading a SpectraLink phone
- Restricting client-to-client forwarding among IP-only clients
- Security ACL configuration scenario
- Managing keys and certificates
- Wireless security through TLS
- PEAP-MS-CHAP-V2 security
- Public key infrastructures
- Public and private keys
- Digital certificates
- PKCS #7, PKCS #10, and PKCS #12 object files
- Creating keys and certificates
- your network
- Creating public-private key pairs
- Generating self-signed certificates
- Installing a key pair and certificate from a PKCS #12 object file
- object file
- Installing a CA's own certificate
- Key and certificate configuration scenarios
- Creating self-signed certificates
- Installing CA-signed certificates from PKCS #12 object files
- CSR) and a PKCS #7 object file
- SSID name "Any
- User credential requirements
- Configuring AAA for network users
- Authentication
- Authentication algorithm
- Last-resort processing
- Accounting
- Summary of AAA features
- Wildcards" and groups for network user classification
- AAA methods for IEEE 802.1X and Web network access
- Remote authentication with local backup
- IEEE 802.1X Extensible Authentication Protocol types
- Effects of authentication type on encryption method
- Configuring 802.1X Acceleration
- Using pass-through
- Authenticating through a local database
- Binding user authentication to machine authentication
- Bonded Authentication period
- Bonded Authentication configuration example
- Configuring authentication and authorization by MAC address
- Adding and clearing MAC users and user groups locally
- Configuring MAC authentication and authorization
- Changing the MAC authorization password for RADIUS
- How Web portal Web-based AAA works
- Web-based AAA requirements and recommendations
- Network requirements
- Configuring Web portal Web-based AAA
- Web-based AAA users
- Using a custom login
- Copying and modifying the Web login
- Using dynamic fields in Web-based AAA redirect URLs
- Using an ACL other than portalacl
- Configuring the Web portal Web-based AAA session timeout period
- Configuring the Web Portal Web-based AAA Logout Function
- Configuring last-resort access for wired authentication ports
- Authentication process for users of a third-party AP
- Requirements
- with tagged SSIDs
- Configuring access for any users of a non-tagged SSID
- Assigning attributes to users and groups
- Assigning SSID default attributes to a service profile
- Assigning a security ACL to a user or a group
- Assigning a security ACL on a RADIUS server
- Assigning encryption types to wireless users
- Assigning and clearing encryption types on a RADIUS server
- Keeping users on the same VLAN even after roaming
- Overriding or adding attributes locally with a location policy
- About the location policy
- How the location policy differs from a security ACL
- Setting the location policy
- Displaying and positioning location policy rules
- Clearing location policy rules and disabling the location policy
- Configuring periodic accounting update records
- Enabling system accounting messages
- Viewing local accounting records
- Viewing roaming accounting records
- Displaying the AAA configuration
- Avoiding AAA problems in configuration order
- Using authentication and accounting rules together
- Configuring a Mobility Profile
- Network user configuration scenarios
- General use of network user commands
- Enabling RADIUS pass-through authentication
- Enabling PEAP-MS-CHAP-V2 authentication
- Enabling PEAP-MS-CHAP-V2 offload
- Combining 802.1X Acceleration with pass-through authentication
- Overriding AAA-assigned VLANs
- Configuring communication with RADIUS
- Before you begin
- Configuring global RADIUS defaults
- Setting the system IP address as the source address
- Configuring individual RADIUS servers
- Deleting RADIUS servers
- Creating server groups
- Adding members to a server group
- Deleting a server group
- Managing 802.1X on the WSS
- Enabling and disabling 802.1X globally
- Setting 802.1X port control
- Enabling 802.1X key transmission
- Configuring 802.1X key transmission time intervals
- Managing WEP keys
- Setting EAP retransmission attempts
- Enabling and disabling 802.1X reauthentication
- Setting the maximum number of 802.1X reauthentication attempts
- Setting the 802.1X reauthentication period
- Setting the bonded authentication period
- Setting the 802.1X quiet period
- Setting the 802.1X timeout for an authorization server
- Setting the 802.1X timeout for a client
- Viewing 802.1X clients
- Viewing the 802.1X configuration
- Viewing 802.1X statistics
- Configuring SODA endpoint security for a WSS
- SODA endpoint security support on WSSs
- How SODA functionality works on WSSs
- Configuring Web Portal Web-based AAA for the service profile
- Creating the SODA agent with SODA manager
- Copying the SODA agent to the WSS
- Installing the SODA agent files on the WSS
- Enabling SODA functionality for the service profile
- Disabling enforcement of SODA agent checks
- Specifying a SODA agent success
- Specifying a SODA agent failure
- Specifying a remediation ACL
- Specifying a SODA agent logout
- Specifying an alternate SODA agent directory for a service profile
- Uninstalling the SODA agent files from the WSS
- Displaying SODA configuration information
- Managing sessions
- Displaying and clearing all administrative sessions
- Displaying and clearing an administrative console session
- Displaying and clearing administrative Telnet sessions
- Displaying and clearing client Telnet sessions
- Displaying verbose network session information
- Displaying and clearing network sessions by username
- Displaying and clearing network sessions by MAC address
- Displaying and clearing network sessions by VLAN name
- Displaying and clearing network sessions by session ID
- Displaying and changing network session timers
- Disabling keepalive probes
- Changing or disabling the user idle timeout
- Rogue detection and counter measures
- Rogue classification
- RF detection scans
- Mobility Domain requirement
- Configuring rogue detection lists
- Configuring a permitted SSID list
- Configuring a client black list
- Configuring an attack list
- Configuring an ignore list
- Enabling countermeasures
- Using on-demand countermeasures in a Mobility Domain
- Disabling or reenabling logging of rogues
- DoS attacks
- Wireless bridge
- IDS log message examples
- Displaying RF detection information
- Displaying rogue clients
- Displaying rogue detection counters
- Displaying SSID or BSSID information for a Mobility Domain
- Displaying RF detect data
- Displaying countermeasures information
- Testing the RFPing
- Managing system files
- Displaying software version information
- Displaying boot information
- Copying a file
- Using an image file's MD5 checksum to verify its integrity
- Creating a subdirectory
- Removing a subdirectory
- Saving configuration changes
- Specifying the configuration file to use after the next reboot
- Specifying a backup configuration file
- Backing up and restoring the system
- Managing configuration changes
- Upgrading the system image
- Upgrading an individual switch using the CLI
- Command changes during upgrade
- Troubleshooting a WSS
- Fixing common WSS setup problems
- Recovering the system when the enable password is lost
- Configuring and managing the system log
- Log message components
- Using log commands
- Logging to the log buffer
- Logging to the console
- Setting Telnet session defaults
- Saving trace messages in a file
- Running traces
- Tracing 802.1X sessions
- Displaying trace results
- Clearing the trace log
- Viewing FDB information
- Port mirroring
- Remotely monitoring traffic
- Configuring a snoop filter
- Displaying configured snoop filters
- Mapping a snoop filter to a radio
- Enabling or disabling a snoop filter
- Capturing system information and sending it to technical support
- The show tech-support command
- Debug messages
- Sending information to NETS
- Enabling and logging onto Web View
- Logging onto Web View
- Supported RADIUS attributes
- Nortel vendor-specific attributes
- Traffic ports used by WSS software
- DHCP server
- How the WSS software DHCP server works
- Displaying DHCP server information
- Glossary
- Index
2382
Table of contents
- configuration guide
- FCC statement (USA only)
- CE marking statement (Europe only)
- VCCI statement (Japan/Nippon only)
- NOM statement (Mexico only)
- Información NOM (unicamente para México)
- Table Of Contents
- Table Of Contents
- Table Of Contents
- getting help from the nortel web site
- Introducing the Nortel WLAN 2300 Series System
- Documentation
- safety and advisory notices
- text and syntax conventions
- WSS overview
- WSS model numbers
- Hardware features
- Nortel WSS 2380 switch
- Nortel WSS 2382 switch
- Management features
- Status LEDs
- WSS 2350 LEDs
- Software features
- Authentication, authorization, and accounting
- and Series 2332 APs
- Installing and connecting a WSS
- Installation requirements and recommendations
- Cable Requirements
- Network cables
- AP cable requirement
- Installing a WSS
- Equipment rack installation
- Tabletop installation
- Installing a new power supply
- Replacing a power supply
- Powering on a WSS
- Powering on a 2350
- Troubleshooting a serial management connection
- Connecting to the network
- Connecting to gigabit ethernet devices
- Connecting to a Fiber Gigabit Device (2382)
- WSS technical specifications
- WSS troubleshooting
- Translations of Important Messages
- Caution statements
- Lithium Battery Caution
- Warning conventions
- Qualified service personnel warning
- Laser warning
- Earth ground warning
- Overcurrent warning
- Radio safety advisories for Access Points
- Index
manualsdatabase
Your AI-powered manual search engine