User Guide
Contents vii
Rogue/Interfering AP Detection . . . . . 163
Denial of Service Detection . . . . . . 164
Man-In-The-Middle Detection
. . . . 164
Signature Detection . . . . . . . . . . 165
Wireless LAN Policies . . . . . . . . . 165
Configuring Rogue AP Detection
. . 166
Configuring Denial of Service
Attack Detection. . . . . . . . . . 168
Configuring Man-In-The-Middle
Attack Detection
. . . . . . . . . . 171
Configuring Signature Detection. . . 173
Adding a New Signature Pattern
. . . 175
Configuring Wireless LAN Policies . 178
Configuring Wireless Bridge
Detection
. . . . . . . . . . . . . . 179
Chapter 14 System and Network
Management 185
Configuring SNMP for the Alcatel
Mobility Controller. . . . . . . . . . . 185
Configuring SNMP for the Access
Points
. . . . . . . . . . . . . . . 189
SNMP Traps from the Switch . . . . . . 196
SNMP traps from Access Point/Air
Monitor
. . . . . . . . . . . . . . . 198
Configuring Logging. . . . . . . . . . . . 202
Chapter 15 Configuring Quality of
Service for Voice
Applications . . . . . . . . . . 207
Configuring QoS for SVP . . . . . . . . . 208
Configuring QoS for SIP . . . . . . . . . 213
Chapter 16 Topology Example One . . . . 219
Chapter 17
Topology Example Two . . . 227
Chapter 18
Topology Example Three . . 239
Chapter 19
Topology Example Four . . . 253
Topology Diagram . . . . . . . . . . . 255
Topology Description
. . . . . . . . . 255










