Symbol Technologies WS 2000 manual Inspecting the Firewall, Configuring the Access Ports

Page 100

Retail Use Cases

Inspecting the Firewall

Clarisa selects the Firewall item in the left menu. Each of the checkbox items represents a type of attack the WS 2000 can filter out. She checks to see that all of the options are enabled.

Clarisa clicks the Apply button to confirm that all attacks listed will be filtered.

Configuring the Access Ports

So far, Clarisa has been operating with the WS 2000 connected only to her laptop. To configure the Access Ports, she will need to connect them to the switch. She plans to use switch ports as follows:

Switch Port

Connected to

Port 1

Access port for the POS WLAN

 

 

Port 2

Access port for the Printer WLAN

 

 

Port 3

Access port for the Cafe WLAN

 

 

Port 4

Wired POS terminal #1

 

 

Port 5

Wired POS terminal #1

 

 

Port 6

In-store server

 

 

Setting Access Port Defaults

The WS 2000 allows the user to specify the default settings for Access Ports. Clarisa expands the Access Ports node in the left menu and selects the 11b Defaults node. Clarisa has only 802.11b Access Ports.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

100

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

 

Image 100
Contents System Reference WS 2000 Wireless Switch Version72E-67701-01 Rev a March Copyright PatentsTable of Contents Chapter Advanced Configuration Chapter Field Office Example 111 About this Document WS 2000 Wireless Switch System Reference GuideDocument Conventions Management of Access Ports Wireless LAN Wlan SecuritySystem Overview Firewall SecurityPhysical Specifications Technical SpecificationsHardware Overview Operating System OS Services Cell Controller ServicesPower Specifications Environmental SpecificationsGateway Services 802.11a Support 802.11b SupportAccess Ports WS 2000 Wireless Switch Firewall Gateway ServicesNetwork Address Translation NAT Layer 3 Routing Snmp Management SupportDhcp Client and Server OverviewWEP 64 40-bit key 802.1x with Radius AuthenticationWEP 128 104-bit Key 802.1x with Shared Key Authentication Kerberos AuthenticationWireless Protected Access WPA KeyGuard-MCM SupportSet up Communication to the Switch Installing the SwitchGetting Started Overview Getting Started Overview Changing the Administrator Password Configure the LAN Interface Configuring the SwitchDefining the Subnets Field DescriptionConfigure Subnets InterfacesDhcp Configuration Advanced Dhcp Settings Configure the WAN Interface Communicating with the Outside WorldSetting Up Point-to-Point over Ethernet PPPoE Communication Enable Wireless LANs WLANs ChapWireless Summary Area Configure WLANs Access Port AdoptionField Description Name Configure Wlan SecuritySubnet Setting the Authentication Method 802.1x EAP AuthenticationKerberos Authentication Setting the Encryption MethodConfiguring WEP Encryption Configuring WPA-TKIP Configure Wlan Security KeyGuard-MCM No EncryptionConfigure Access Ports Mobile Unit Access Control List ACLConfigure Access Ports Configure Subnet Access NameAccess Overview Table Access Exception AreaColor Access Type Description Green YellowProtocol Transport Description Port Used HttpTransport Description ALLAdvanced Configuration WLAN-How to Configure Advanced SettingsWLAN-Setting Default Access Port Settings WLAN-Setting Default Access Port Settings Beacon Interval Dtim PeriodPrimary Wlan WLAN-Advanced Access Port SettingsSecurity Beacon WLAN-Advanced Access Port Settings Beacon is a packet broadcast by the adopted access ports to Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure the WS 2000 Firewall Always On Firewall FiltersConfigurable Firewall Filters Gateway-How to Configure Static Routes Mime Flood Attack CheckSetting the RIP Configuration Defining RoutesNo RIP RIPSecurity-How to Configure 802.1x EAP Authentication RIP v2Compat NoneSecurity-How to Configure 802.1x EAP Authentication Security-How to Configure 802.1x EAP Authentication Security-How to Configure Kerberos Authentication Security-How to Specify a Network Time Protocol NTP Server Switch Settings WS 2000 Wireless Switch LED FunctionsOverview Location DescriptionChanging the Name of the Switch Change the Location and Country Settings of the WS Location fieldHow to Restart the WS 2000 Wireless Switch Updating the WS 2000 Wireless Switch’s FirmwareChecking for and Downloading Firmware updates Performing the Firmware UpdateSystem Configuration Exporting and Importing Wireless Switch SettingsTo Import Settings to a Local File To Import or Export Settings to an FTP SiteTo Export Settings to a Local File How to Restore Default Configuration Settings Property Value Remote Administration How to Configure Snmp TrapsSetting the Snmp Version Configuration Setting Up Snmp v1/v2c Community DefinitionsSetting Up Snmp v3 Community Definitions NoAuthAuthNoPriv AuthPrivSetting Up the Access Control List Setting the Trap ConfigurationAuthentication ConfigurationTrap Trap Name Generates a Trap when… Category Cold StartSetting the Trap Configuration for Snmp v1/v2c Configure Administrator Access Setting the Trap Configuration for SnmpConfigure Management Access Access Port DescriptionAccess Port Statistics Setup AirBEAM Software AccessChanging the Administrator and Manager Passwords Statistics and LogsGeneral Access Port Information Received and Transmitted Tables Associated Mobile UnitsSubnet Statistics Received Field Description Transmitted Description FieldWAN Statistics InterfacesReceived Field Description Setting Up and Viewing the System Log Viewing the Log on the SwitchSetting Up a Log Server Retail Use Cases BackgroundPlan Configuring the System Settings Contacting the Wireless SwitchEntering the Basic System Settings Setting Access Control IP Address Plan Configuring the SubnetsSubnet IP Address Range Configuring POS Subnet For each subnetConfiguring the Printer Subnet Retail Use Cases Configuring the Cafe Subnet Retail Use Cases Configuring the WAN Interface Configuring Network Address Translation NAT Retail Use Cases Configuring the Access Ports Setting Access Port DefaultsSwitch Port Connected to Inspecting the FirewallNaming the POS Access Port Configuring the Printer Access Port Configuring the Cafe Access Port Associating the Access Ports to the WLANs Configuring the WLANs Configuring the Cafe WlanConfiguring the Printer Wlan Name PrinterConfiguring the POS Wlan For the POS WLAN, she makes the following choicesSetting Subnet Access Retail Use Cases Testing Connections Configuring the ClientsWireless Authentication Encryption Channel Client IP Address Subnet Mask Gateway PortField Office Example Plan Configuring the System Settings Entering the Basic System Settings Setting Access Control Field Office Example Configuring the LAN Configuring the Engineering LANField Office Example Field Office Example Configuring the Sales Subnet Configuring the WAN Field Office Example Setting Up Network Address Translation Field Office Example Confirm Firewall Configuration Adopting Access PortsMAC Address Location Adoption List LabelField Office Example Configuring the WLANs Security Field Office Example Wlan Field Office Example Field Office Example Field Office Example Access Port Channel Configuring Subnet Access Installing the Access Ports and Testing Appendix A. Sample Configuration File NTP menu Wlan 1 configuration set mode 1 enable Wlan 3 configuration set mode 3 disable Default 802.11 a radio configuration set reg a in/out 149 Access Port configuration LAN Dhcp configuration network Firewall configuration set syn enable Outbound 1-To-Many NAT configuration set outb map s1 Page Index FTP Snmp 802.1x EAP authentication