User's Manual
Table Of Contents
- Chapter 1 Introduction
- Chapter 2 Hardware Installation
- Chapter 3 Network Configuration
- Chapter 4 Initial Configuration
- Chapter 5 System Configuration
- Chapter 6 Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- SNMP Commands
- Flash/File Commands
- RADIUS Client
- 802.1x Port Authentication
- Filtering Commands
- Interface Commands
- interface
- dns server
- ip address
- ip dhcp
- shutdown
- speed-duplex
- show interface ethernet
- description
- closed-system
- speed
- channel
- turbo
- ssid
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- authentication
- encryption
- key
- transmit-key
- transmit-power
- max-association
- multicast-cipher
- wpa-clients
- wpa-mode
- wpa-preshared-key
- wpa-psk-type
- shutdown
- show interface wireless
- show station
- IAPP Commands
- VLAN Commands
- Appendix A Troubleshooting
- Appendix B Cables and Pinouts
- Appendix C Specifications
- Glossary
- Index
Index-1
Numerics
802.11g 6-65
A
Advanced Encryption Standard See
AES
AES 5-38
antennas, positioning 2-2
authentication 5-9, 6-80
configuring 5-9, 6-80
MAC address 5-10, 6-51, 6-52
type 4-9, 5-31, 6-72
B
Basic Service Set See BSS
beacon
interval 5-28, 6-76
rate 5-28, 6-77
BOOTP 6-67, 6-68
BSS 3-3
C
cable
assignments B-1
crossover B-3
straight-through B-3
channel 5-27, 6-74
channels, maximum C-1
Clear To Send See CTS
CLI 6-1
command modes 6-6
clients, maximum C-1
closed system 6-72
command line interface See CLI
community name, configuring 5-16,
6-32
community string 5-17, 6-32
configuration settings, saving or
restoring 5-21, 6-39
configuration, initial setup 4-1
console port 1-5
connecting 2-3
pin assignments B-4
required settings 4-2
crossover cable B-3
CSMA/CA 1-1
CTS 5-28, 6-79
D
data rate, options C-1
device status, displaying 5-40, 6-30
DHCP 4-8, 5-5, 5-6, 6-67, 6-68
distances, maximum A-4
DNS 5-6, 6-66
Domain Name Server See DNS
downloading software 5-19, 6-39
DTIM 5-28, 6-77
Dynamic Host Configuration Protocol
See DHCP
E
EAP 5-36, 6-88
encryption 5-31, 5-33, 5-36, 6-81
Ethernet
cable 2-2
port 1-6
event logs 5-44, 6-25
Extensible Authentication Protocol
See EAP
Index