Enterasys Networks RBT-4102 manual Enterasys Networks, Inc. Software License Agreement

Page 7

Enterasys Networks, Inc. Software License Agreement

This document is an agreement (“Agreement”) between You, the end user, and Enterasys Networks, Inc. on behalf of itself and its Affiliates (“Enterasys”) that sets forth your rights and obligations with respect to the software contained in CD‐ROM or other media. “Affiliates” means any person, partnership, corporation, limited liability company, or other form of enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under common control with the party specified. BY INSTALLING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.

IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, INC. (978) 684‐1000. Attn: Legal Department.

Enterasys will grant You a non‐transferable, non‐exclusive license to use the machine‐readable form of software (the “Licensed Software”) and the accompanying documentation (the Licensed Software, the media embodying the Licensed Software, and the documentation are collectively referred to in this Agreement as the “Licensed Materials”) on one single computer if You agree to the following terms and conditions:

1.TERM. This Agreement is effective from the date on which You open the package containing the Licensed Materials. You may terminate the Agreement at any time by destroying the Licensed Materials, together with all copies, modifications and merged portions in any form. The Agreement and your license to use the Licensed Materials will also terminate if You fail to comply with any term or condition herein.

2.GRANT OF SOFTWARE LICENSE. The license granted to You by Enterasys when You open this sealed package authorizes You to use the Licensed Software on any one, single computer only, or any replacement for that computer, for internal use only. A separate license, under a separate Software License Agreement, is required for any other computer on which You or another individual or employee intend to use the Licensed Software. YOU MAY NOT USE, COPY, OR MODIFY THE LICENSED MATERIALS, IN WHOLE OR IN PART, EXCEPT AS EXPRESSLY PROVIDED IN THIS AGREEMENT.

3.RESTRICTION AGAINST COPYING OR MODIFYING LICENSED MATERIALS. Except as expressly permitted in this Agreement, You may not copy or otherwise reproduce the Licensed Materials. In no event does the limited copying or reproduction permitted under this Agreement include the right to decompile, disassemble, electronically transfer, or reverse engineer the Licensed Software, or to translate the Licensed Software into another computer language.

The media embodying the Licensed Software may be copied by You, in whole or in part, into printed or machine readable form, in sufficient numbers only for backup or archival purposes, or to replace a worn or defective copy. However, You agree not to have more than two (2) copies of the Licensed Software in whole or in part, including the original media, in your possession for said purposes without Enterasys’ prior written consent, and in no event shall You operate more than one copy of the Licensed Software. You may not copy or reproduce the documentation. You agree to maintain appropriate records of the location of the original media and all copies of the Licensed Software, in whole or in part, made by You. You may modify the machine‐readable form of the Licensed Software for (1) your own internal use or (2) to merge the Licensed Software into other program material to form a modular work for your own use, provided that such work remains modular, but on termination of this Agreement, You are required to completely remove the Licensed Software from any such modular work. Any portion of the Licensed Software included in any such modular work shall be used only on a single computer for internal purposes and shall remain subject to all the terms and conditions of this Agreement.

You agree to include any copyright or other proprietary notice set forth on the label of the media embodying the Licensed Software on any copy of the Licensed Software in any form, in whole or in part, or on any modification of the Licensed Software or any such modular work containing the Licensed Software or any part thereof.

4.TITLE AND PROPRIETARY RIGHTS.

(a)The Licensed Materials are copyrighted works and are the sole and exclusive property of Enterasys, any company or a division thereof which Enterasys controls or is controlled by, or which may result from the merger or consolidation with Enterasys (its “Affiliates”), and/or their suppliers. This Agreement conveys a limited right to operate the Licensed Materials and shall not be construed to convey title to the Licensed Materials to You. There are no implied rights. You shall not sell, lease, transfer, sublicense, dispose of, or otherwise make available the Licensed Materials or any portion thereof, to any other party.

(b)You further acknowledge that in the event of a breach of this Agreement, Enterasys shall suffer severe and irreparable damages for which monetary compensation alone will be inadequate. You therefore agree that in the event of a breach of this Agreement, Enterasys shall be entitled to monetary damages and its reasonable attorney’s fees and costs in enforcing this Agreement, as well as injunctive relief to restrain such breach, in addition to any other remedies available

v

Image 7
Contents Enterasys RoamAbout Page Page Enterasys Networks, Inc. Firmware License Agreement Iii Page Enterasys Networks, Inc. Software License Agreement Page General Viii Contents Snmp Index Appendix a Default Settings Appendix B TroubleshootingXii Associated Documents Purpose of This ManualIntended Audience Firmware Version SupportConvention Description Getting HelpOverview IntroductionPolicy FeaturesApplications Applications Introduction Network Configuration Network Topologies Ad Hoc Wireless LAN no Access Point or BridgeInfrastructure Wireless LAN Infrastructure Wireless LANInfrastructure Wireless LAN for Roaming Infrastructure Wireless LAN for Roaming Wireless PCsInfrastructure Wireless Bridge Infrastructure Wireless BridgeNetwork Topologies Network Configuration Required Connections Initial Setup Using the CLILogging Enter no ip dhcp to disable Dhcp Using Web Management Initial Setup Using the CLI ```` Initial Setup Using the CLI Initial Setup Using the CLI Initial Setup Using the CLI Initial Setup Using the CLI Using the Command Line Interface CLI Using the Web InterfaceSnmp Identification Using Web Management to Configure System InformationSG Singapore Using the CLI to Configure System InformationEnabled DisabledTCP / IP Settings Using Web Management to Configure TCP/IP TCP / IP Settings TCP/IP Configuration Using the CLI to Configure TCP/IPEthernet Settings Configuration SSH ConfigurationTCP / IP Settings Radius Using Web Management to Configure Radius Radius Attributes Radius Accounting Attribute Description Using the CLI to Configure Radius Authentication Using Web Management to Configure Authentication Local Using the CLI to Configure AuthenticationAllowed Filter Control and VLANs Using Web Management to Configure Filter Control and VLANsFilter Control and VLANs CLI Commands for Vlan Support Using the CLI to Configure Filter Control and VLANsFilter Control and VLANs CLI Commands for Filtering SVP Commands Using Web Management to Configure CDP CDP SettingsCDP Settings Using the CLI to Configure CDP Rogue AP Detection Using Web Management to Configure Rogue AP DetectionUsing the CLI to Configure Rogue AP Detection TT5 SsidSnmp Using Web Management to Configure SnmpSnmp Notifications Description Snmp Notifications Security Level Snmp Targets CLI Commands for Snmp Using the CLI to Configure SnmpTPS CLI Commands for Configuring SNMPv3 Users and GroupsSnmp CLI Commands for Configuring SNMPv3 Trap Filters CLI Commands for Configuring SNMPv3 TargetsChanging the Password AdministrationUsing Web Management to Change the Password Enabling and Disabling Com Port Using the CLI to Change the PasswordUsing Web Management to Enable and Disable Com Port Using the CLI to Enable and Disable Com PortUpgrading Firmware Using Web Management to Upgrade Firmware Using the CLI to Upgrade Firmware System Log Using Web Management to Configure System LogLogging Level Descriptions Error Level Using the CLI to Configure System Log Using Web Management to Configure Sntp TAIPEI, Beijing Using the CLI to Configure SntpWDS and STP Using Web Management to Configure WDS and STP WDS and STP WDS and STP Using the CLI to Configure WDS Using the CLI to Configure STP Radio Interface Radio Signal CharacteristicsUsing Web Management to Configure Interface Radio Settings Radio SettingsVlan ID Radius Attributes Number Value Radio Interface Radio Interface Radio Interface Example Dynamic WEPAES-TKIP Not SupportedAdmission Control No Example PRE Shared KEY LongTkip RequiredAC1Background Txop Limit 0.000 ms WMM Operation Wi-Fi Multimedia WMM ConfigurationWMM Backoff Wait times Using Web Management to Configure WMMSsid SW-WDS Using the CLI to Configure WMMAntenna Admission Control No AC2Video Txop Limit Using Web Management to Configure Virtual APs Virtual APs VAPs ConfigurationRadio Interface Using the CLI to Configure Virtual APs WPA-ONLY BIT EncryptionAdmission Control No WEP SecurityUsing Web Management to Configure Security Settings Wired Equivalent Privacy WEPSecurity Page Authentication 802.1x Authentication Security Security Using the CLI to Configure WPA over 802.1X Security Using the CLI to Configure WPA Pre-Shared KeyQuality of Service AC1Background LogCwMin LogCwMax Empty Using the CLI to Configure Local MAC AuthenticationNopassword Allowed Local Nopassword AllowedSecurity Using the CLI to Configure Radius MAC Authentication Remote Using the CLI to Configure WEP Shared Key Security TKIP-WEP Ssid WPAShared Ssid ETS Using the CLI to Configure WEP over 802.1x SecurityAuthentication Parameters AES Using the CLI to Configure WPA2 SecurityWPA2-ONLY Using the CLI to Configure WPA2 Pre-Shared Key Security WPA2-PSK Status Menu Description Status InformationUsing Web Management to View AP Status Status Information SQA Using the CLI to Display AP StatusUsing Web Management to View CDP Status Using the CLI to Display CDP Status Using Web Management to View Station Status Status Information Using Web Management to View Neighbor AP Detection Status DEMOWEP1 Using the CLI to View Neighbor AP Detection StatusIbss Gtac LAB R2Using Web Management to View WDS-STP Status Show bridge Using the CLI to View WDS-STP StatusSTP Child Status Show bridge linkNone Root Bridge StatusUsing Web Management to View Event Logs RoamAbout 4102#show events Using the CLI to View Event LogsOct 101551 Status Information Advanced Configuration Default Settings CDP WDS & STP VAP1 Nopassword Preamble Length Long Wireless Interface 802.11b/g Troubleshooting Steps TroubleshootingTroubleshooting Steps 80 m 264 ft Maximum Distance TablesMaximum Distance Tables Troubleshooting Index Radius MAC WDS 4-50bridge 4-52CLI Index-4
Related manuals
Manual 78 pages 58.85 Kb