Enterasys Networks RBT-4102 manual

Page 8

to Enterasys.

5.PROTECTION AND SECURITY. In the performance of this Agreement or in contemplation thereof, You and your employees and agents may have access to private or confidential information owned or controlled by Enterasys relating to the Licensed Materials supplied hereunder including, but not limited to, product specifications and schematics, and such information may contain proprietary details and disclosures. All information and data so acquired by You or your employees or agents under this Agreement or in contemplation hereof shall be and shall remain Enterasys’ exclusive property, and You shall use your best efforts (which in any event shall not be less than the efforts You take to ensure the confidentiality of your own proprietary and other confidential information) to keep, and have your employees and agents keep, any and all such information and data confidential, and shall not copy, publish, or disclose it to others, without Enterasys’ prior written approval, and shall return such information and data to Enterasys at its request. Nothing herein shall limit your use or dissemination of information not actually derived from Enterasys or of information which has been or subsequently is made public by Enterasys, or a third party having authority to do so.

You agree not to deliver or otherwise make available the Licensed Materials or any part thereof, including without limitation the object or source code (if provided) of the Licensed Software, to any party other than Enterasys or its employees, except for purposes specifically related to your use of the Licensed Software on a single computer as expressly provided in this Agreement, without the prior written consent of Enterasys. You agree to use your best efforts and take all reasonable steps to safeguard the Licensed Materials to ensure that no unauthorized personnel shall have access thereto and that no unauthorized copy, publication, disclosure, or distribution, in whole or in part, in any form shall be made, and You agree to notify Enterasys of any unauthorized use thereof. You acknowledge that the Licensed Materials contain valuable confidential information and trade secrets, and that unauthorized use, copying and/or disclosure thereof are harmful to Enterasys or its Affiliates and/or its/their software suppliers.

6.MAINTENANCE AND UPDATES. Updates and certain maintenance and support services, if any, shall be provided to You pursuant to the terms of an Enterasys Service and Maintenance Agreement, if Enterasys and You enter into such an agreement. Except as specifically set forth in such agreement, Enterasys shall not be under any obligation to provide Software Updates, modifications, or enhancements, or Software maintenance and support services to You.

7.DEFAULT AND TERMINATION. In the event that You shall fail to keep, observe, or perform any obligation under this Agreement, including a failure to pay any sums due to Enterasys, or in the event that You become insolvent or seek protection, voluntarily or involuntarily, under any bankruptcy law, Enterasys may, in addition to any other remedies it may have under law, terminate the License and any other agreements between Enterasys and You.

(a)Immediately after any termination of the Agreement or if You have for any reason discontinued use of Software, You shall return to Enterasys the original and any copies of the Licensed Materials and remove the Licensed Software from any modular works made pursuant to Section 3, and certify in writing that through your best efforts and to the best of your knowledge the original and all copies of the terminated or discontinued Licensed Materials have been returned to Enterasys.

(b)Sections 4, 5, 7, 8, 9, 10, 11, and 12 shall survive termination of this Agreement for any reason.

8.EXPORT REQUIREMENTS. You understand that Enterasys and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party.

If the Licensed Materials are exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Licensed Materials and agree that You will use the Licensed Materials for civil end uses only and not for military purposes.

If the Licensed Materials are exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Section 4 of this Agreement, You agree not to

(i)reexport or release the Licensed Software, the source code for the Licensed Software or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Kyrgyzstan, Laos, Libya, Macau, Moldova, Mongolia, North Korea, the People’s Republic of China, Russia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Licensed Software or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.

vi

Image 8
Contents Enterasys RoamAbout Page Page Enterasys Networks, Inc. Firmware License Agreement Iii Page Enterasys Networks, Inc. Software License Agreement Page General Viii Contents Snmp Appendix a Default Settings Appendix B Troubleshooting IndexXii Purpose of This Manual Intended AudienceFirmware Version Support Associated DocumentsGetting Help Convention DescriptionIntroduction OverviewFeatures PolicyApplications Applications Introduction Network Configuration Ad Hoc Wireless LAN no Access Point or Bridge Network TopologiesInfrastructure Wireless LAN Infrastructure Wireless LANInfrastructure Wireless LAN for Roaming Wireless PCs Infrastructure Wireless LAN for RoamingInfrastructure Wireless Bridge Infrastructure Wireless BridgeNetwork Topologies Network Configuration Initial Setup Using the CLI Required ConnectionsLogging Enter no ip dhcp to disable Dhcp Using Web Management Initial Setup Using the CLI ```` Initial Setup Using the CLI Initial Setup Using the CLI Initial Setup Using the CLI Initial Setup Using the CLI Using the Web Interface Using the Command Line Interface CLISnmp Using Web Management to Configure System Information IdentificationUsing the CLI to Configure System Information EnabledDisabled SG SingaporeTCP / IP Settings Using Web Management to Configure TCP/IP TCP / IP Settings Using the CLI to Configure TCP/IP TCP/IP ConfigurationSSH Configuration Ethernet Settings ConfigurationTCP / IP Settings Radius Using Web Management to Configure Radius Radius Attributes Radius Accounting Attribute Description Using the CLI to Configure Radius Authentication Using Web Management to Configure Authentication Allowed Using the CLI to Configure AuthenticationLocal Using Web Management to Configure Filter Control and VLANs Filter Control and VLANsFilter Control and VLANs Using the CLI to Configure Filter Control and VLANs CLI Commands for Vlan SupportFilter Control and VLANs CLI Commands for Filtering SVP Commands CDP Settings Using Web Management to Configure CDPCDP Settings Using the CLI to Configure CDP Using Web Management to Configure Rogue AP Detection Rogue AP DetectionUsing the CLI to Configure Rogue AP Detection Ssid TT5Using Web Management to Configure Snmp SnmpSnmp Notifications Description Snmp Notifications Security Level Snmp Targets Using the CLI to Configure Snmp CLI Commands for SnmpCLI Commands for Configuring SNMPv3 Users and Groups TPSSnmp CLI Commands for Configuring SNMPv3 Targets CLI Commands for Configuring SNMPv3 Trap FiltersAdministration Changing the PasswordUsing Web Management to Change the Password Using the CLI to Change the Password Using Web Management to Enable and Disable Com PortUsing the CLI to Enable and Disable Com Port Enabling and Disabling Com PortUpgrading Firmware Using Web Management to Upgrade Firmware Using the CLI to Upgrade Firmware Using Web Management to Configure System Log System LogLogging Level Descriptions Error Level Using the CLI to Configure System Log Using Web Management to Configure Sntp Using the CLI to Configure Sntp TAIPEI, BeijingWDS and STP Using Web Management to Configure WDS and STP WDS and STP WDS and STP Using the CLI to Configure WDS Using the CLI to Configure STP Radio Signal Characteristics Radio InterfaceRadio Settings Using Web Management to Configure Interface Radio SettingsVlan ID Radius Attributes Number Value Radio Interface Radio Interface Radio Interface Example WEP AES-TKIPNot Supported DynamicAdmission Control No Example Long TkipRequired PRE Shared KEYAC1Background Txop Limit 0.000 ms Wi-Fi Multimedia WMM Configuration WMM OperationUsing Web Management to Configure WMM WMM Backoff Wait timesUsing the CLI to Configure WMM Ssid SW-WDSAntenna Admission Control No AC2Video Txop Limit Virtual APs VAPs Configuration Using Web Management to Configure Virtual APsRadio Interface Using the CLI to Configure Virtual APs BIT Encryption WPA-ONLYAdmission Control No Security WEPWired Equivalent Privacy WEP Using Web Management to Configure Security SettingsSecurity Page Authentication 802.1x Authentication Security Security Using the CLI to Configure WPA Pre-Shared Key Using the CLI to Configure WPA over 802.1X SecurityQuality of Service AC1Background LogCwMin LogCwMax Using the CLI to Configure Local MAC Authentication Nopassword Allowed LocalNopassword Allowed EmptySecurity Using the CLI to Configure Radius MAC Authentication Remote Using the CLI to Configure WEP Shared Key Security Shared Ssid WPATKIP-WEP Using the CLI to Configure WEP over 802.1x Security Ssid ETSAuthentication Parameters Using the CLI to Configure WPA2 Security AESWPA2-ONLY Using the CLI to Configure WPA2 Pre-Shared Key Security WPA2-PSK Status Information Status Menu DescriptionUsing Web Management to View AP Status Status Information Using the CLI to Display AP Status SQAUsing Web Management to View CDP Status Using the CLI to Display CDP Status Using Web Management to View Station Status Status Information Using Web Management to View Neighbor AP Detection Status Using the CLI to View Neighbor AP Detection Status IbssGtac LAB R2 DEMOWEP1Using Web Management to View WDS-STP Status STP Using the CLI to View WDS-STP StatusShow bridge Show bridge link Child StatusRoot Bridge Status NoneUsing Web Management to View Event Logs Using the CLI to View Event Logs RoamAbout 4102#show eventsOct 101551 Status Information Advanced Configuration Default Settings CDP WDS & STP VAP1 Nopassword Preamble Length Long Wireless Interface 802.11b/g Troubleshooting Troubleshooting StepsTroubleshooting Steps Maximum Distance Tables 80 m 264 ftMaximum Distance Tables Troubleshooting Index Radius MAC WDS 4-50bridge 4-52CLI Index-4
Related manuals
Manual 78 pages 58.85 Kb