dimensions, physical  | 8  | 
downloads, firmware  | 65  | 
EAP authentication  | 
  | 
configuring  | 56  | 
WLANs  | 32  | 
encryption method  | 
  | 
36  | |
none  | 36  | 
setting  | 33  | 
WEP  | 33  | 
34  | |
environmental specifications  | 9  | 
example use cases  | 
  | 
field office  | 111  | 
retail  | 86  | 
firewall | 
  | 
access policies  | 13  | 
administration  | 13  | 
always on filters  | 52  | 
configurable filters  | 53  | 
configuration  | 52  | 
DHCP client and server  | 14  | 
example use cases  | 100, 125 | 
features  | 13  | 
FTP bounce attack check  | 53  | 
IP unaligned timestamp check  | 53  | 
MIME flood attack check  | 54  | 
overview  | 13  | 
security  | 7  | 
sequence number prediction check... 53  | |
source routing check  | 53  | 
stateful inspection engine  | 13  | 
SYN flood attack  | 53  | 
Winnuke attack check  | 53  | 
firmware  | 
  | 
downloads  | 65  | 
updating  | 64, 65  | 
FTP | 
  | 
bounce attack check  | 53  | 
sending settings to site  | 67  | 
using for firmware updates  | 65  | 
full access  | 40  | 
Gateway | 
  | 
configuring static routes  | 54  | 
firewall configuration  | 52  | 
NAT configuration  | 50  | 
NAT services  | 13  | 
overview of services  | 10  | 
hardware, overview  | 8  | 
installation | 
  | 
changing password  | 20  | 
overview  | 18  | 
  | 
  | Index  | |
setting up communication  | 18  | ||
interfaces, subnets  | 
  | 82  | |
IP unaligned timestamp check  | 53  | ||
Kerberos authentication  | 
  | 
  | 
  | 
802.1x  | 
  | 16  | |
configuring  | 
  | 59  | |
WLANs  | 
  | 33  | |
  | 
  | 
  | |
configuring  | 
  | 36  | |
overview  | 
  | 17  | |
LAN interface  | 
  | 
  | 
  | 
configuration  | 
  | 21  | |
defining subnets  | 
  | 22  | |
example use cases  | 
  | 117  | |
Layer 3 routing  | 
  | 
  | 
  | 
overview  | 
  | 14  | |
RIP  | 
  | 14  | |
LED functions  | 
  | 61  | |
limited access  | 
  | 40  | |
location, changing  | 
  | 63  | |
management  | 
  | 
  | 
  | 
changing password  | 
  | 77  | |
configuring access  | 
  | 76  | |
MIME flood attack check  | ....................  | 54  | |
mobile units  | 
  | 
  | 
  | 
ACL  | 
  | 37  | |
associations  | 
  | 79  | |
name, changing for switch  | 62  | ||
NAT | 
  | 
  | 
  | 
configuration  | 
  | 50  | |
example use cases  | 98, 123  | ||
overview  | 
  | 13  | |
Network Address Translation ....  | See NAT | ||
no access  | 
  | 40  | |
NTP servers, specifying  | 
  | 60  | |
operating system services  | 
  | 9  | |
overview, system  | 
  | 7  | |
passwords, changing  | 20, 77  | ||
physical specifications  | 
  | 8  | |
.. 27  | |||
ports, access  | See access ports  | ||
POS access port, example use cases ..  | 101  | ||
POS subnet, example use case  | 92  | ||
power specifications  | 
  | 9  | |
printer access port, example use cases 102 | |||
protocols, access  | 
  | 40  | |
RADIUS authentication, 802.1x  | 15  | ||
received tables  | 
  | 79  | |
remote administration  | 
  | 70  | |
resetting switch  | 
  | 64  | |
retail use cases  | 
  | 86  | |
RIP | 
  | 
  | 
  | 
Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved  | 148  | 
WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004  | 
  |