Symbol Technologies WS 2000 manual Entering the Basic System Settings

Page 89

Retail Use Cases

Clarisa starts her web browser and enters “http://192.168.0.1/” as the URL. The WS 2000 sends a login page to her browser.

She logs in using “admin” for the username and “symbol” as the password.

Entering the Basic System Settings

Clarisa selects System Settings in the left menu, located under the System Configuration heading.

The System Name is used to distinguish between WS 2000 switches for remote configuration. She gives the switch a descriptive name, “SanJose-1”. This name will appear in the footer for subsequent configuration windows for the switch. She does not need the name now, while she is in San Jose. But later, when she returns to corporate headquarters and wants to log into several switches remotely, it will help her to know which switch she is working on. She also enters a slightly longer description on the System Location field.

She enters her email address into the Admin Email Address box. CCC uses an SNMP manager that has the capability of monitoring network devices and sending email to the manager of a device that is in an unusual state. This is the email address that will be supplied to that SNMP manager for this switch.

She sets the country to “United States - US”. Different countries have different regulations for the use of these radio frequencies. Setting the location configures the switch to use only the channels, frequencies, and power levels that are legal for that country.

Clarisa clicks the Apply button to save her changes.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

89

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

 

Image 89
Contents 72E-67701-01 Rev a March WS 2000 Wireless Switch VersionSystem Reference Patents CopyrightTable of Contents Chapter Advanced Configuration Chapter Field Office Example 111 Document Conventions WS 2000 Wireless Switch System Reference GuideAbout this Document Wireless LAN Wlan Security Management of Access PortsSystem Overview Firewall SecurityHardware Overview Technical SpecificationsPhysical Specifications Cell Controller Services Operating System OS ServicesPower Specifications Environmental SpecificationsGateway Services 802.11b Support 802.11a SupportAccess Ports Network Address Translation NAT Gateway ServicesWS 2000 Wireless Switch Firewall Snmp Management Support Layer 3 RoutingDhcp Client and Server OverviewWEP 128 104-bit Key 802.1x with Radius AuthenticationWEP 64 40-bit key Kerberos Authentication 802.1x with Shared Key AuthenticationKeyGuard-MCM Support Wireless Protected Access WPAGetting Started Overview Installing the SwitchSet up Communication to the Switch Getting Started Overview Changing the Administrator Password Configuring the Switch Configure the LAN InterfaceField Description Defining the SubnetsInterfaces Configure SubnetsDhcp Configuration Advanced Dhcp Settings Communicating with the Outside World Configure the WAN InterfaceSetting Up Point-to-Point over Ethernet PPPoE Communication Chap Enable Wireless LANs WLANsWireless Summary Area Access Port Adoption Configure WLANsSubnet Configure Wlan SecurityField Description Name 802.1x EAP Authentication Setting the Authentication MethodConfiguring WEP Encryption Setting the Encryption MethodKerberos Authentication Configuring WPA-TKIP Configure Wlan Security No Encryption KeyGuard-MCMMobile Unit Access Control List ACL Configure Access PortsConfigure Access Ports Name Configure Subnet AccessAccess Exception Area Access Overview TableColor Access Type Description Green YellowHttp Protocol Transport Description Port UsedALL Transport DescriptionWLAN-How to Configure Advanced Settings Advanced ConfigurationWLAN-Setting Default Access Port Settings WLAN-Setting Default Access Port Settings Dtim Period Beacon IntervalSecurity Beacon WLAN-Advanced Access Port SettingsPrimary Wlan WLAN-Advanced Access Port Settings Beacon is a packet broadcast by the adopted access ports to Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure Network Address Translation NAT Always On Firewall Filters Gateway-How to Configure the WS 2000 FirewallConfigurable Firewall Filters Mime Flood Attack Check Gateway-How to Configure Static RoutesDefining Routes Setting the RIP ConfigurationNo RIP RIPRIP v2 Security-How to Configure 802.1x EAP AuthenticationCompat NoneSecurity-How to Configure 802.1x EAP Authentication Security-How to Configure 802.1x EAP Authentication Security-How to Configure Kerberos Authentication Security-How to Specify a Network Time Protocol NTP Server WS 2000 Wireless Switch LED Functions Switch SettingsOverview Location DescriptionChanging the Name of the Switch Location field Change the Location and Country Settings of the WSUpdating the WS 2000 Wireless Switch’s Firmware How to Restart the WS 2000 Wireless SwitchPerforming the Firmware Update Checking for and Downloading Firmware updatesExporting and Importing Wireless Switch Settings System ConfigurationTo Export Settings to a Local File To Import or Export Settings to an FTP SiteTo Import Settings to a Local File How to Restore Default Configuration Settings Property Value How to Configure Snmp Traps Remote AdministrationSetting the Snmp Version Configuration Setting Up Snmp v1/v2c Community DefinitionsNoAuth Setting Up Snmp v3 Community DefinitionsAuthNoPriv AuthPrivSetting the Trap Configuration Setting Up the Access Control ListConfiguration AuthenticationTrap Trap Name Generates a Trap when… Category Cold StartSetting the Trap Configuration for Snmp v1/v2c Setting the Trap Configuration for Snmp Configure Administrator AccessAccess Port Description Configure Management AccessSetup AirBEAM Software Access Access Port StatisticsChanging the Administrator and Manager Passwords Statistics and LogsGeneral Access Port Information Associated Mobile Units Received and Transmitted TablesSubnet Statistics Transmitted Description Field Received Field DescriptionInterfaces WAN StatisticsReceived Field Description Viewing the Log on the Switch Setting Up and Viewing the System LogSetting Up a Log Server Background Retail Use CasesPlan Contacting the Wireless Switch Configuring the System SettingsEntering the Basic System Settings Setting Access Control Subnet IP Address Range Configuring the SubnetsIP Address Plan For each subnet Configuring POS SubnetConfiguring the Printer Subnet Retail Use Cases Configuring the Cafe Subnet Retail Use Cases Configuring the WAN Interface Configuring Network Address Translation NAT Retail Use Cases Setting Access Port Defaults Configuring the Access PortsSwitch Port Connected to Inspecting the FirewallNaming the POS Access Port Configuring the Printer Access Port Configuring the Cafe Access Port Associating the Access Ports to the WLANs Configuring the Cafe Wlan Configuring the WLANsName Printer Configuring the Printer WlanFor the POS WLAN, she makes the following choices Configuring the POS WlanSetting Subnet Access Retail Use Cases Configuring the Clients Testing ConnectionsWireless Authentication Encryption Channel Client IP Address Subnet Mask Gateway PortField Office Example Plan Configuring the System Settings Entering the Basic System Settings Setting Access Control Field Office Example Configuring the Engineering LAN Configuring the LANField Office Example Field Office Example Configuring the Sales Subnet Configuring the WAN Field Office Example Setting Up Network Address Translation Field Office Example Adopting Access Ports Confirm Firewall ConfigurationMAC Address Location Adoption List LabelField Office Example Configuring the WLANs Security Field Office Example Wlan Field Office Example Field Office Example Field Office Example Access Port Channel Configuring Subnet Access Installing the Access Ports and Testing Appendix A. Sample Configuration File NTP menu Wlan 1 configuration set mode 1 enable Wlan 3 configuration set mode 3 disable Default 802.11 a radio configuration set reg a in/out 149 Access Port configuration LAN Dhcp configuration network Firewall configuration set syn enable Outbound 1-To-Many NAT configuration set outb map s1 Page Index FTP Snmp 802.1x EAP authentication