Specifications

Index-3
counters
radio 9-60
See also statistics
country, specifying 9-22
critical logging level A-5
Cryptographic Message Syntax
Standard 16-4
current TTY session A-4
D
database, local
clearing users from 3-8
mapping security ACLs to users in
17-48
date, configuring 5-20
daylight savings time, configuring 5-21
DEASSOCIATED user state, for
roaming 7-8
debug logging level A-5
delimiter characters, for user globs 1-4
delivery traffic indication map (DTIM)
interval 9-45
Denial-of-Service (DoS) protection
22-12
destination, logging A-4
DHCP client 5-2
DHCP option 43 9-4
DHCP server E-1
diagnostics A-10
digital certificates. See certificates
digital signatures 16-2
directory, displaying 23-4
Distributed APs
AeroScout RFID tag support 25-1
mapping security ACLs to 15-14
DNS (Domain Name Service) 5-16, D-1
client 5-16
domain name 5-17
servers 5-17
servers, displaying 5-18
documentation, product iii
domain name 5-17
Domain Name Service. See DNS
(Domain Name Service)
DoS attacks 22-13
dotted decimal notation, in IP
addresses 1-3
double asterisks (**)
in user globs 1-4
in VLAN globs 1-5
wildcard 1-8
draft-congdon-radius-8021x-29.txt C-1
DTIM (delivery traffic indication map)
interval 9-45
dual homing F-1
dynamic entries
ARP 5-25
FDB 4-20
Dynamic Frequency Selection (DFS)
22-4
dynamic security ACLs. See user-
based security ACLs
dynamic tuning 11-1
dynamic WEP 19-3
E
EAP (Extensible Authentication
Protocol)
authentication, available
encryption 17-12
defined 17-2, 17-11
offload 17-14
pass-through authentication 17-14
RADIUS authentication 18-2
self-signed certificate 16-7
EAP-MD5 authentication protocol 17-11
EAPoL key messages 19-3
EAP-TLS authentication protocol 17-11
edit buffer
displaying 15-10
temporary storage for security
ACLs 15-4
editing the command line 1-7
emergency logging level A-5
enable password 3-6
changing 3-6
initial settings 3-5
enabled access 1-9
configuring 3-5
enabled mode. See enabled access
encrypted SSID 9-17
encryption
affects of authentication methods
on 17-12
assigning a type locally 17-49
assigning a type on a RADIUS
server 17-50
clearing types from users 17-50
configuration scenarios 10-18
effects of authentication on 17-12
radios 10-1
encryption keys
configuration scenarios 16-11
overview 16-1
Encryption-Type attribute C-5
assigning 17-48, 17-49
End-Date attribute
description C-5
enrolling with a certificate authority 16-9
Enterasys Networks Mobility System iii
eq (equal to) operator
in security ACLs 15-7
in the location policy 17-53
error logging level A-5
EtherChannel interoperability 4-13
Ethernet ports
port list conventions 1-6
Event-Timestamp attribute C-5
Extensible Authentication Protocol
(EAP). See EAP (Extensible
Authentication Protocol)
F
fallthru authentication type
changing 9-40
fast convergence features 13-7
backbone fast convergence 13-8
backbone fast convergence,
configuring 13-9
port fast convergence 13-7
port fast convergence, configuring
13-8
uplink fast convergence 13-8
uplink fast convergence,
configuring 13-10
FDB (forwarding database) 4-20
adding entries 4-22
displaying 4-21
removing entries 4-23
timers 4-23
files
copying 23-5
deleting 23-8
directory 23-4
Filter-Id attribute C-2
reassigning with the location policy
17-52
filters, packet 15-1
reassigning in a location policy rule
17-54
fingerprint
Access Point (AP) 9-35
firewalls, in a Mobility Domain D-1
firmware, automatic upgrades 9-34
first-time configuration, via the console
3-5
flash memory. See nonvolatile storage
flood attacks 22-13
forwarding database. See FDB
(forwarding database)
forwarding delay
configuring 13-6
defined 13-6
fragmentation threshold 9-46
G
global RADIUS defaults, setting 18-3
globs, VLAN
defined 1-5
globs. See MAC address globs; user
globs; VLAN globs
grace period, for roaming 7-9
gt (greater than) operator in security