Symbol Technologies WS 2000 manual Transport Description, All

Page 42

Step 8: Configure Subnet Access

Select a transport type from the Transport column’s pulldown menu. The available transports are:

Transport

Description

ALL

This selection designates all of the protocols displayed in the

 

table’s pull-down list, as described below.

TCP

Transmission Control Protocol (TCP) is a set of rules used with

 

Internet Protocol (IP) to send data as message units over the

 

Internet. While IP handles the actual delivery of data, TCP

 

keeps track of individual units of data called packets. Messages

 

are divided into packets for efficient routing through the Internet.

UDP

User Datagram Protocol (UDP) is mostly used for broadcasting

 

data over the Internet. Like TCP, UDP runs on top of Internet

 

Protocol (IP) networks. Unlike TCP/IP, UDP/IP provides very

 

few error recovery services and methods. UDP offers a way to

 

directly connect, and then send and receive datagrams over an

 

IP network.

ICMP

Internet Control Message Protocol (ICMP) is tightly integrated

 

with IP. ICMP messages, delivered in IP packets, are used for

 

out-of-band messages related to network operation. Because

 

ICMP uses IP, ICMP packet delivery is unreliable. Hosts cannot

 

count on receiving ICMP packets for a network problem.

AH

Authentication Header (AH) is one of the two key components of

 

IPsec (IP Security Protocol). The other key component is

 

Encapsulating Security Protocol (ESP), described below.

 

AH provides authentication, proving the packet sender really is

 

the sender, and the data really is the data sent. AH can be used

 

in transport mode, providing security between two end points.

 

Also, AH can be used in tunnel mode, providing security like that

 

of a Virtual Private Network (VPN).

ESP

Encapsulating Security Protocol (ESP) is one of the two key

 

components of IPsec (IP Security Protocol). The other key

 

component is Authentication Header (AH), described above.

 

ESP encrypts the payload of packets, and also provides

 

authentication services. ESP can be used in transport mode,

 

providing security between two end points. Also, ESP can be

 

used in tunnel mode, providing security like that of a Virtual

 

Private Network (VPN).

GRE

General Routing Encapsulation (GRE) supports VPNs across

 

the Internet. GRE is a mechanism for encapsulating network

 

layer protocols over any other network layer protocol. Such

 

encapsulation allows routing of IP packets between private IP

 

networks across an Internet that uses globally assigned IP

 

addresses.

Specify port information for the protocol. If a protocol uses only one port, enter the same port number in the Start Port and End Port columns, or leave the End Port column blank. Otherwise, use both columns for an entry that has a range of ports.

5.Click the Apply button to save changes.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

42

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

 

Image 42
Contents WS 2000 Wireless Switch Version System Reference72E-67701-01 Rev a March Copyright PatentsTable of Contents Chapter Advanced Configuration Chapter Field Office Example 111 WS 2000 Wireless Switch System Reference Guide About this DocumentDocument Conventions System Overview Management of Access PortsWireless LAN Wlan Security Firewall SecurityTechnical Specifications Physical SpecificationsHardware Overview Power Specifications Operating System OS ServicesCell Controller Services Environmental SpecificationsGateway Services 802.11a Support 802.11b SupportAccess Ports Gateway Services WS 2000 Wireless Switch FirewallNetwork Address Translation NAT Dhcp Client and Server Layer 3 RoutingSnmp Management Support Overview802.1x with Radius Authentication WEP 64 40-bit keyWEP 128 104-bit Key 802.1x with Shared Key Authentication Kerberos AuthenticationWireless Protected Access WPA KeyGuard-MCM SupportInstalling the Switch Set up Communication to the SwitchGetting Started Overview Getting Started Overview Changing the Administrator Password Configure the LAN Interface Configuring the SwitchDefining the Subnets Field DescriptionConfigure Subnets InterfacesDhcp Configuration Advanced Dhcp Settings Configure the WAN Interface Communicating with the Outside WorldSetting Up Point-to-Point over Ethernet PPPoE Communication Enable Wireless LANs WLANs ChapWireless Summary Area Configure WLANs Access Port AdoptionConfigure Wlan Security Field Description NameSubnet Setting the Authentication Method 802.1x EAP AuthenticationSetting the Encryption Method Kerberos AuthenticationConfiguring WEP Encryption Configuring WPA-TKIP Configure Wlan Security KeyGuard-MCM No EncryptionConfigure Access Ports Mobile Unit Access Control List ACLConfigure Access Ports Configure Subnet Access NameColor Access Type Description Green Access Overview TableAccess Exception Area YellowProtocol Transport Description Port Used HttpTransport Description ALLAdvanced Configuration WLAN-How to Configure Advanced SettingsWLAN-Setting Default Access Port Settings WLAN-Setting Default Access Port Settings Beacon Interval Dtim PeriodWLAN-Advanced Access Port Settings Primary WlanSecurity Beacon WLAN-Advanced Access Port Settings Beacon is a packet broadcast by the adopted access ports to Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure the WS 2000 Firewall Always On Firewall FiltersConfigurable Firewall Filters Gateway-How to Configure Static Routes Mime Flood Attack CheckNo RIP Setting the RIP ConfigurationDefining Routes RIPCompat Security-How to Configure 802.1x EAP AuthenticationRIP v2 NoneSecurity-How to Configure 802.1x EAP Authentication Security-How to Configure 802.1x EAP Authentication Security-How to Configure Kerberos Authentication Security-How to Specify a Network Time Protocol NTP Server Overview Switch SettingsWS 2000 Wireless Switch LED Functions Location DescriptionChanging the Name of the Switch Change the Location and Country Settings of the WS Location fieldHow to Restart the WS 2000 Wireless Switch Updating the WS 2000 Wireless Switch’s FirmwareChecking for and Downloading Firmware updates Performing the Firmware UpdateSystem Configuration Exporting and Importing Wireless Switch SettingsTo Import or Export Settings to an FTP Site To Import Settings to a Local FileTo Export Settings to a Local File How to Restore Default Configuration Settings Property Value Setting the Snmp Version Configuration Remote AdministrationHow to Configure Snmp Traps Setting Up Snmp v1/v2c Community DefinitionsAuthNoPriv Setting Up Snmp v3 Community DefinitionsNoAuth AuthPrivSetting Up the Access Control List Setting the Trap ConfigurationTrap Trap Name Generates a Trap when… Category AuthenticationConfiguration Cold StartSetting the Trap Configuration for Snmp v1/v2c Configure Administrator Access Setting the Trap Configuration for SnmpConfigure Management Access Access Port DescriptionChanging the Administrator and Manager Passwords Access Port StatisticsSetup AirBEAM Software Access Statistics and LogsGeneral Access Port Information Received and Transmitted Tables Associated Mobile UnitsSubnet Statistics Received Field Description Transmitted Description FieldWAN Statistics InterfacesReceived Field Description Setting Up and Viewing the System Log Viewing the Log on the SwitchSetting Up a Log Server Retail Use Cases BackgroundPlan Configuring the System Settings Contacting the Wireless SwitchEntering the Basic System Settings Setting Access Control Configuring the Subnets IP Address PlanSubnet IP Address Range Configuring POS Subnet For each subnetConfiguring the Printer Subnet Retail Use Cases Configuring the Cafe Subnet Retail Use Cases Configuring the WAN Interface Configuring Network Address Translation NAT Retail Use Cases Switch Port Connected to Configuring the Access PortsSetting Access Port Defaults Inspecting the FirewallNaming the POS Access Port Configuring the Printer Access Port Configuring the Cafe Access Port Associating the Access Ports to the WLANs Configuring the WLANs Configuring the Cafe WlanConfiguring the Printer Wlan Name PrinterConfiguring the POS Wlan For the POS WLAN, she makes the following choicesSetting Subnet Access Retail Use Cases Wireless Authentication Encryption Channel Testing ConnectionsConfiguring the Clients Client IP Address Subnet Mask Gateway PortField Office Example Plan Configuring the System Settings Entering the Basic System Settings Setting Access Control Field Office Example Configuring the LAN Configuring the Engineering LANField Office Example Field Office Example Configuring the Sales Subnet Configuring the WAN Field Office Example Setting Up Network Address Translation Field Office Example MAC Address Location Confirm Firewall ConfigurationAdopting Access Ports Adoption List LabelField Office Example Configuring the WLANs Security Field Office Example Wlan Field Office Example Field Office Example Field Office Example Access Port Channel Configuring Subnet Access Installing the Access Ports and Testing Appendix A. Sample Configuration File NTP menu Wlan 1 configuration set mode 1 enable Wlan 3 configuration set mode 3 disable Default 802.11 a radio configuration set reg a in/out 149 Access Port configuration LAN Dhcp configuration network Firewall configuration set syn enable Outbound 1-To-Many NAT configuration set outb map s1 Page Index FTP Snmp 802.1x EAP authentication