Enterasys Networks RBT-4102 manual Iii

Page 5

If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Section 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau, Moldova, Mongolia, North Korea, the People’s Republic of China, Russia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant or any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.

5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227‐19 (a) through (d) of the Commercial Computer Software‐Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered commercial computer software in accordance with DFARS section 227.7202‐3 and its successors, and use, duplication, or disclosure by the U.S. Government is subject to restrictions set forth herein.

6.DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU IN WRITING BY ENTERASYS, ENTERASYS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON‐INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY (30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU.

7.LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT.

THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY YOU FOR THE RIGHTS GRANTED HEREIN.

8.AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical value to Enterasys, and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records, accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys’ right of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your business. In the event such audit discovers non‐compliance with this Agreement, including copies of the Program made, used or deployed in breach of this Agreement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves the right, to be exercised in its sole discretion and without prior notice, to terminate this license, effective immediately, for failure to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.

9.OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys.

10.ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and all remedies available at law.

iii

Image 5
Contents Enterasys RoamAbout Page Page Enterasys Networks, Inc. Firmware License Agreement Iii Page Enterasys Networks, Inc. Software License Agreement Page General Viii Contents Snmp Index Appendix a Default Settings Appendix B TroubleshootingXii Intended Audience Purpose of This ManualFirmware Version Support Associated DocumentsConvention Description Getting HelpOverview IntroductionPolicy FeaturesApplications Applications Introduction Network Configuration Network Topologies Ad Hoc Wireless LAN no Access Point or BridgeInfrastructure Wireless LAN Infrastructure Wireless LANInfrastructure Wireless LAN for Roaming Infrastructure Wireless LAN for Roaming Wireless PCsInfrastructure Wireless Bridge Infrastructure Wireless BridgeNetwork Topologies Network Configuration Required Connections Initial Setup Using the CLILogging Enter no ip dhcp to disable Dhcp Using Web Management Initial Setup Using the CLI ```` Initial Setup Using the CLI Initial Setup Using the CLI Initial Setup Using the CLI Initial Setup Using the CLI Using the Command Line Interface CLI Using the Web InterfaceSnmp Identification Using Web Management to Configure System InformationEnabled Using the CLI to Configure System InformationDisabled SG SingaporeTCP / IP Settings Using Web Management to Configure TCP/IP TCP / IP Settings TCP/IP Configuration Using the CLI to Configure TCP/IPEthernet Settings Configuration SSH ConfigurationTCP / IP Settings Radius Using Web Management to Configure Radius Radius Attributes Radius Accounting Attribute Description Using the CLI to Configure Radius Authentication Using Web Management to Configure Authentication Allowed Using the CLI to Configure AuthenticationLocal Filter Control and VLANs Using Web Management to Configure Filter Control and VLANsFilter Control and VLANs CLI Commands for Vlan Support Using the CLI to Configure Filter Control and VLANsFilter Control and VLANs CLI Commands for Filtering SVP Commands Using Web Management to Configure CDP CDP SettingsCDP Settings Using the CLI to Configure CDP Rogue AP Detection Using Web Management to Configure Rogue AP DetectionUsing the CLI to Configure Rogue AP Detection TT5 SsidSnmp Using Web Management to Configure SnmpSnmp Notifications Description Snmp Notifications Security Level Snmp Targets CLI Commands for Snmp Using the CLI to Configure SnmpTPS CLI Commands for Configuring SNMPv3 Users and GroupsSnmp CLI Commands for Configuring SNMPv3 Trap Filters CLI Commands for Configuring SNMPv3 TargetsChanging the Password AdministrationUsing Web Management to Change the Password Using Web Management to Enable and Disable Com Port Using the CLI to Change the PasswordUsing the CLI to Enable and Disable Com Port Enabling and Disabling Com PortUpgrading Firmware Using Web Management to Upgrade Firmware Using the CLI to Upgrade Firmware System Log Using Web Management to Configure System LogLogging Level Descriptions Error Level Using the CLI to Configure System Log Using Web Management to Configure Sntp TAIPEI, Beijing Using the CLI to Configure SntpWDS and STP Using Web Management to Configure WDS and STP WDS and STP WDS and STP Using the CLI to Configure WDS Using the CLI to Configure STP Radio Interface Radio Signal CharacteristicsUsing Web Management to Configure Interface Radio Settings Radio SettingsVlan ID Radius Attributes Number Value Radio Interface Radio Interface Radio Interface Example AES-TKIP WEPNot Supported DynamicAdmission Control No Example Tkip LongRequired PRE Shared KEYAC1Background Txop Limit 0.000 ms WMM Operation Wi-Fi Multimedia WMM ConfigurationWMM Backoff Wait times Using Web Management to Configure WMMSsid SW-WDS Using the CLI to Configure WMMAntenna Admission Control No AC2Video Txop Limit Using Web Management to Configure Virtual APs Virtual APs VAPs ConfigurationRadio Interface Using the CLI to Configure Virtual APs WPA-ONLY BIT EncryptionAdmission Control No WEP SecurityUsing Web Management to Configure Security Settings Wired Equivalent Privacy WEPSecurity Page Authentication 802.1x Authentication Security Security Using the CLI to Configure WPA over 802.1X Security Using the CLI to Configure WPA Pre-Shared KeyQuality of Service AC1Background LogCwMin LogCwMax Nopassword Allowed Local Using the CLI to Configure Local MAC AuthenticationNopassword Allowed EmptySecurity Using the CLI to Configure Radius MAC Authentication Remote Using the CLI to Configure WEP Shared Key Security Shared Ssid WPATKIP-WEP Ssid ETS Using the CLI to Configure WEP over 802.1x SecurityAuthentication Parameters AES Using the CLI to Configure WPA2 SecurityWPA2-ONLY Using the CLI to Configure WPA2 Pre-Shared Key Security WPA2-PSK Status Menu Description Status InformationUsing Web Management to View AP Status Status Information SQA Using the CLI to Display AP StatusUsing Web Management to View CDP Status Using the CLI to Display CDP Status Using Web Management to View Station Status Status Information Using Web Management to View Neighbor AP Detection Status Ibss Using the CLI to View Neighbor AP Detection StatusGtac LAB R2 DEMOWEP1Using Web Management to View WDS-STP Status STP Using the CLI to View WDS-STP StatusShow bridge Child Status Show bridge linkNone Root Bridge StatusUsing Web Management to View Event Logs RoamAbout 4102#show events Using the CLI to View Event LogsOct 101551 Status Information Advanced Configuration Default Settings CDP WDS & STP VAP1 Nopassword Preamble Length Long Wireless Interface 802.11b/g Troubleshooting Steps TroubleshootingTroubleshooting Steps 80 m 264 ft Maximum Distance TablesMaximum Distance Tables Troubleshooting Index Radius MAC WDS 4-50bridge 4-52CLI Index-4
Related manuals
Manual 78 pages 58.85 Kb